Software Integrity Attacks |
Attack Pattern ID: 184 (Meta Attack Pattern Completeness: Complete) | Typical Severity: Low | Status: Draft |
Software Integrity Attacks |
Attack Pattern ID: 184 (Meta Attack Pattern Completeness: Complete) | Typical Severity: Low | Status: Draft |
Summary
An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity to achieve an insecure state.
Manual or user-assisted attacks require deceptive mechanisms to trick the user into clicking a link or downloading and installing software. Automated update attacks require the attacker to host a payload and then trigger the installation of the payload code.
Software Integrity Attacks are usually a late stage focus of attack activity which depends upon the success of a chain of prior events. The resources required to perform the attack vary with respect to the overall attack strategy, existing countermeasures which must be bypassed, and the success of early phase attack vectors.
CWE-ID | Weakness Name | Weakness Relationship Type |
---|---|---|
494 | Download of Code Without Integrity Check | Targeted |
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 210 | Abuse of Functionality | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 111 | JSON Hijacking (aka JavaScript Hijacking) | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 185 | Malicious Software Download | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.