Vereisten
The adversary must have the capability to interact with the configuration of the targeted system.
Vereiste middelen
None: No specialized resources are required to execute this type of attack.
Mitigaties
Ensure proper permissions are in place to prevent adversaries from altering the execution status of security tools.
Gerelateerde zwakheden
| CWE-ID |
Zwakheidsnaam |
|
Improper Access Control The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Indiening
| Naam |
Organisatie |
Datum |
Releasedatum |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
|
Wijzigingen
| Naam |
Organisatie |
Datum |
Opmerking |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, References, Related_Weaknesses, Resources_Required, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit, Typical_Severity |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Related_Attack_Patterns, Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Taxonomy_Mappings |