-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CAPEC-558
:
Replace Trusted Executable
Attack Pattern ID
:
558
Version
:
v3.9
Attack Pattern Name
:
Replace Trusted Executable
Abstraction
:
Detailed
Status
:
Stable
Likelihood of Attack
:
Low
Typical Severity
:
High
Details
Content History
Related Weaknesses
Reports
▼
Description
An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called.
▼
Extended Description
▼
Alternate Terms
▼
Relationships
Nature
Type
ID
Name
ChildOf
S
542
Targeted Malware
Nature:
ChildOf
Type:
Standard
ID:
542
Name:
Targeted Malware
▼
Execution Flow
▼
Prerequisites
▼
Skills Required
▼
Resources Required
▼
Indicators
▼
Consequences
Scope
Likelihood
Impact
Note
▼
Mitigations
▼
Example Instances
▼
Related Weaknesses
ID
Name
CWE-284
Improper Access Control
ID:
CWE-284
Name:
Improper Access Control
▼
Taxonomy Mappings
Taxonomy Name
Entry ID
Entry Name
ATTACK
1505.005
Server Software Component: Terminal Services DLL
ATTACK
1546.008
Event Triggered Execution: Accessibility Features
Taxonomy Name:
ATTACK
Entry ID:
1505.005
Entry Name:
Server Software Component: Terminal Services DLL
Taxonomy Name:
ATTACK
Entry ID:
1546.008
Entry Name:
Event Triggered Execution: Accessibility Features
▼
Notes
▼
References
Details not found