Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-558:Replace Trusted Executable
Attack Pattern ID:558
Version:v3.9
Attack Pattern Name:Replace Trusted Executable
Abstraction:Detailed
Status:Stable
Likelihood of Attack:Low
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfS542Targeted Malware
Nature: ChildOf
Type: Standard
ID: 542
Name: Targeted Malware
▼Execution Flow
▼Prerequisites
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
CWE-284Improper Access Control
ID: CWE-284
Name: Improper Access Control
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
ATTACK1505.005Server Software Component: Terminal Services DLL
ATTACK1546.008Event Triggered Execution: Accessibility Features
Taxonomy Name: ATTACK
Entry ID: 1505.005
Entry Name: Server Software Component: Terminal Services DLL
Taxonomy Name: ATTACK
Entry ID: 1546.008
Entry Name: Event Triggered Execution: Accessibility Features
▼Notes
▼References
Details not found