CAPEC-578 Disable Security Software

CAPEC ID: 578

CAPEC-578 Metadata

Likelihood of Attack

Medium

Typical Severity

Medium

Overview

Summary

An adversary exploits a weakness in access control to disable security tools so that detection does not occur. This can take the form of killing processes, deleting registry keys so that tools do not start at run time, deleting log files, or other methods.

Prerequisites

The adversary must have the capability to interact with the configuration of the targeted system.

Potential Solutions / Mitigations

Ensure proper permissions are in place to prevent adversaries from altering the execution status of security tools.

Related Weaknesses (CWE)

CWE ID Description
CWE-284 Improper Access Control

Related CAPECs

CAPEC ID Description
CAPEC-176 An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1556.006 Modify Authentication Process: Multi-Factor Authentication
1562.001 Impair Defenses: Disable or Modify Tools
1562.002 Impair Defenses: Disable Windows Event Logging
1562.004 Impair Defenses: Disable or Modify System Firewall
1562.007 Impair Defenses: Disable or Modify Cloud Firewall
1562.008 Impair Defenses: Disable Cloud Logs
1562.009 Impair Defenses: Safe Mode Boot

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.