Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-562:Modify Shared File
Attack Pattern ID:562
Version:v3.9
Attack Pattern Name:Modify Shared File
Abstraction:Detailed
Status:Draft
Likelihood of Attack:
Typical Severity:
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary manipulates the files in a shared location by adding malicious programs, scripts, or exploit code to valid content. Once a user opens the shared content, the tainted content is executed.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfS17Using Malicious Files
Nature: ChildOf
Type: Standard
ID: 17
Name: Using Malicious Files
▼Execution Flow
▼Prerequisites
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
▼Mitigations
Disallow shared content. Protect shared folders by minimizing users that have write access. Use utilities that mitigate exploitation like the Microsoft Enhanced Mitigation Experience Toolkit (EMET) to prevent exploits from being run.
▼Example Instances
▼Related Weaknesses
IDName
CWE-284Improper Access Control
ID: CWE-284
Name: Improper Access Control
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
ATTACK1080Taint shared content
Taxonomy Name: ATTACK
Entry ID: 1080
Entry Name: Taint shared content
▼Notes
▼References
Details not found