CAPEC-456: Infected Memory
ID
CAPEC-456
Typical Severity
High
Likelihood Of Attack
Medium
Status
Stable
An adversary inserts malicious logic into memory enabling them to achieve a negative impact. This logic is often hidden from the user of the system and works behind the scenes to achieve negative impacts. This pattern of attack focuses on systems already fielded and used in operation as opposed to systems that are still under development and part of the supply chain.
Weaknesses
# ID | Name | Type |
---|---|---|
CWE-1257 | Improper Access Control Applied to Mirrored or Aliased Memory Regions | weakness |
CWE-1260 | Improper Handling of Overlap Between Protected Memory Ranges | weakness |
CWE-1274 | Improper Access Control for Volatile Memory Containing Boot Code | weakness |
CWE-1312 | Missing Protection for Mirrored Regions in On-Chip Fabric Firewall | weakness |
CWE-1316 | Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges | weakness |