Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-551:Modify Existing Service
Attack Pattern ID:551
Version:v3.9
Attack Pattern Name:Modify Existing Service
Abstraction:Detailed
Status:Draft
Likelihood of Attack:
Typical Severity:
DetailsContent HistoryRelated WeaknessesReports
▼Description
When an operating system starts, it also starts programs called services or daemons. Modifying existing services may break existing services or may enable services that are disabled/not commonly used.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfS542Targeted Malware
Nature: ChildOf
Type: Standard
ID: 542
Name: Targeted Malware
▼Execution Flow
▼Prerequisites
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
▼Mitigations
Limit privileges of user accounts so service changes can only be performed by authorized administrators. Also monitor any service changes that may occur inadvertently.
▼Example Instances
▼Related Weaknesses
IDName
CWE-284Improper Access Control
CWE-522Insufficiently Protected Credentials
ID: CWE-284
Name: Improper Access Control
ID: CWE-522
Name: Insufficiently Protected Credentials
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
ATTACK1543Create or Modify System Process
Taxonomy Name: ATTACK
Entry ID: 1543
Entry Name: Create or Modify System Process
▼Notes
▼References
Details not found