CWE-506
Embedded Malicious Code
AI Translation Available
The product contains code that appears to be malicious in nature.
Status
incomplete
Abstraction
class
Affected Platforms
Extended Description
AI Translation
Malicious flaws have acquired colorful names, including Trojan horse, trapdoor, timebomb, and logic-bomb. A developer might insert malicious code with the intent to subvert the security of a product or its host system at some time in the future. It generally refers to a program that performs a useful service but exploits rights of the program's user in a way the user does not intend.
Technical Details
AI Translation
Common Consequences
confidentiality
integrity
availability
Impacts
execute unauthorized code or commands
Detection Methods
manual static analysis - binary or bytecode
dynamic analysis with manual results interpretation
manual static analysis - source code
automated static analysis
Potential Mitigations
Phases:
testing
Descriptions:
•
Remove the malicious code and start an effort to ensure that no more malicious code exists. This may require a detailed review of all code, as it is possible to hide a serious attack in only one or two lines of code. These lines may be located almost anywhere in an application and may have been intentionally obfuscated by the attacker.