Home > CAPEC List > CAPEC-518: Documentation Alteration to Produce Under-performing Systems (Version 2.10)  

CAPEC-518: Documentation Alteration to Produce Under-performing Systems

Documentation Alteration to Produce Under-performing Systems
Definition in a New Window Definition in a New Window
Attack Pattern ID: 518
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker with access to a manufacturer's documentation alters the descriptions of system capabilities with the intent of causing errors in derived system requirements, impacting the overall effectiveness and capability of the system, allowing an attacker to take advantage of the introduced system capability flaw once the system is deployed.

+ Attack Prerequisites
  • Advanced knowledge of software and hardware capabilities of a manufacturer's product.

  • Access to the manufacturer's documentation.

+ Typical Severity


+ Typical Likelihood of Exploit

Likelihood: Low

The nature of these type of attacks involve a coordinated effort between well-funded multiple attackers, and sometimes require physical access to successfully complete an attack. As a result these types of attacks are not launched on a large scale against any potential victim, but are typically highly targeted against victims who are often targeted and may have rather sophisticated cyber defenses already in place.

+ Examples-Instances


A security subsystem involving encryption is a part of a product, but due to the demands of this subsystem during operation, the subsystem only runs when a specific amount of memory and processing is available. An attacker alters the descriptions of the system capabilities so that when deployed with the minimal requirements at the victim location, the encryption subsystem is never operational, leaving the system in a weakened security state.

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: High

Ability to read, interpret, and subsequently alter manufacturer's documentation to misrepresent system capabilities.

Skill or Knowledge Level: High

Ability to stealthly gain access via remote compromise or physical access to the manufacturer's documentation.

+ References
[R.518.1] [REF-50] John F. Miller. "Supply Chain Attack Framework and Attack Patterns". The MITRE Corporation. 2013. <http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf>.
+ Content History
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Related_Attack_Patterns, Typical_Likelihood_of_ExploitInternal
More information is available — Please select a different filter.
Page Last Updated or Reviewed: May 01, 2017