CWE-507

Trojan Horse
AI Translation Available

The product appears to contain benign or useful functionality, but it also contains code that is hidden from normal operation that violates the intended security policy of the user or the system administrator.

Status
incomplete
Abstraction
base

Common Consequences

confidentiality integrity availability
Impacts
execute unauthorized code or commands

Potential Mitigations

Phases:
operation installation
Descriptions:
• Verify the integrity of the product that is being installed.
• Most antivirus software scans for Trojan Horses.