Home > CAPEC List > CAPEC-519: Documentation Alteration to Cause Errors in System Design (Version 2.9)  

CAPEC-519: Documentation Alteration to Cause Errors in System Design

 
Documentation Alteration to Cause Errors in System Design
Definition in a New Window Definition in a New Window
Attack Pattern ID: 519
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker with access to a manufacturer's documentation containing requirements allocation and software design processes maliciously alters the documentation in order to cause errors in system design. This allows the attacker to take advantage of a weakness in a deployed system of the manufacturer for malicious purposes.

+ Attack Prerequisites
  • Advanced knowledge of software capabilities of a manufacturer's product.

  • Access to the manufacturer's documentation.

+ Typical Severity

High

+ Typical Likelihood of Exploit

Likelihood: Low

The nature of these type of attacks involve a coordinated effort between well-funded multiple attackers, and sometimes require physical access to successfully complete an attack. As a result these types of attacks are not launched on a large scale against any potential victim, but are typically highly targeted against victims who are often targeted and may have rather sophisticated cyber defenses already in place.

+ Examples-Instances

Description

During operation, a firewall will restart various subsystems to reload and implement new rules as added by the user. An attacker alters the software design dependencies in the manufacturer's documentation so that under certain predictable conditions the reload will fail to load in rules resulting in a "fail open" state. Once deployed at a victim site, this will allow the attacker to bypass the victim's firewall.

+ Attacker Skills or Knowledge Required

Skill or Knowledge Level: High

Ability to read, interpret, and subsequently alter manufacturer's documentation to cause errors in system design.

Skill or Knowledge Level: High

Ability to stealthly gain access via remote compromise or physical access to the manufacturer's documentation.

+ References
[R.519.1] [REF-50] John F. Miller. "Supply Chain Attack Framework and Attack Patterns". The MITRE Corporation. 2013. <http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf>.
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Related_Attack_Patterns, Typical_Likelihood_of_ExploitInternal

More information is available — Please select a different filter.
Page Last Updated or Reviewed: December 07, 2015