CAPEC-549 Local Execution of Code

CAPEC ID: 549

CAPEC-549 Metadata

Likelihood of Attack

Medium

Typical Severity

High

Overview

Summary

An adversary installs and executes malicious code on the target system in an effort to achieve a negative technical impact. Examples include rootkits, ransomware, spyware, adware, and others.

Prerequisites

Knowledge of the target system's vulnerabilities that can be capitalized on with malicious code.The adversary must be able to place the malicious code on the target system.

Potential Solutions / Mitigations

Employ robust cybersecurity training for all employees. Implement system antivirus software that scans all attachments before opening them. Regularly patch all software. Execute all suspicious files in a sandbox environment.

Related Weaknesses (CWE)

CWE ID Description
CWE-829 Inclusion of Functionality from Untrusted Control Sphere

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.