CAPEC-533: Malicious Manual Software Update

ID CAPEC-533
Typical Severity High
Likelihood Of Attack Low
Status Draft

An attacker introduces malicious code to the victim's system by altering the payload of a software update, allowing for additional compromise or site disruption at the victim location. These manual, or user-assisted attacks, vary from requiring the user to download and run an executable, to as streamlined as tricking the user to click a URL. Attacks which aim at penetrating a specific network infrastructure often rely upon secondary attack methods to achieve the desired impact. Spamming, for example, is a common method employed as an secondary attack vector. Thus the attacker has in their arsenal a choice of initial attack vectors ranging from traditional SMTP/POP/IMAP spamming and its varieties, to web-application mechanisms which commonly implement both chat and rich HTML messaging within the user interface.

https://capec.mitre.org/data/definitions/533.html

Weaknesses

# ID Name Type
CWE-494 Download of Code Without Integrity Check weakness
Loading...