Conditions préalables
The adversary must have the capability to interact with the configuration of the targeted system.
Ressources nécessaires
None: No specialized resources are required to execute this type of attack.
Atténuations
Ensure proper permissions are in place to prevent adversaries from altering the execution status of security tools.
Faiblesses connexes
| CWE-ID |
Nom de la faiblesse |
|
Improper Access Control The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Soumission
| Nom |
Organisation |
Date |
Date de publication |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Modifications
| Nom |
Organisation |
Date |
Commentaire |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, References, Related_Weaknesses, Resources_Required, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit, Typical_Severity |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Related_Attack_Patterns, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Taxonomy_Mappings |