CAPEC-440 Metadata
Likelihood of Attack
Low
Typical Severity
High
Overview
Summary
An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack.
Prerequisites
Influence over the deployed system at a victim location.
Potential Solutions / Mitigations
No specific solutions listed.
Taxonomy Mappings
Taxonomy: ATTACK
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.