CAPEC-203: Manipulate Registry Information

ID CAPEC-203
Typical Severity Medium
Status Stable

An adversary exploits a weakness in authorization in order to modify content within a registry (e.g., Windows Registry, Mac plist, application registry). Editing registry information can permit the adversary to hide configuration information or remove indicators of compromise to cover up activity. Many applications utilize registries to store configuration and service information. As such, modification of registry information can affect individual services (affecting billing, authorization, or even allowing for identity spoofing) or the overall configuration of a targeted application. For example, both Java RMI and SOAP use registries to track available services. Changing registry values is sometimes a preliminary step towards completing another attack pattern, but given the long term usage of many registry values, manipulation of registry information could be its own end.

https://capec.mitre.org/data/definitions/203.html

Weaknesses

# ID Name Type
CWE-15 External Control of System or Configuration Setting weakness

Taxonomiy Mapping

Type # ID Name
ATTACK 1112 Modify Registry
ATTACK 1647 Plist Modification
Loading...