CAPEC 536 Data Injected During Configuration

Stable Standard Low Risk
Severity High

Description

An attacker with access to data files and processes on a victim's system injects malicious data into critical operational data during configuration or recalibration, causing the victim's system to perform in a suboptimal manner that benefits the adversary.

Attack Execution Flow

4

Mitigations

1

Consequences

Relationships