CAPEC-176 Configuration/Environment Manipulation

CAPEC ID: 176

CAPEC-176 Metadata

Likelihood of Attack

Medium

Typical Severity

Medium

Overview

Summary

An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack.

Prerequisites

The target application must consult external files or configuration controls to control its execution. All but the very simplest applications meet this requirement.

Potential Solutions / Mitigations

No specific solutions listed.

Related Weaknesses (CWE)

CWE ID Description
CWE-15 External Control of System or Configuration Setting
CWE-1233 Security-Sensitive Hardware Controls with Missing Lock Bit Protection
CWE-1234 Hardware Internal or Debug Modes Allow Override of Locks
CWE-1304 Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
CWE-1328 Security Version Number Mutable to Older Versions

Taxonomy Mappings

Taxonomy: OWASP Attacks

Entry ID Entry Name
Link Setting Manipulation

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.