Dark Mode

Settings

Capec-176 Detail

Configuration/Environment Manipulation

Meta Supply Chain Software Hardware Typical Severity: Medium

Children: 75 203 271 536 578

Threats: T62 T68 T269 T270 T271 T272 T273 T274 T297 T393

Description

An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack.

Not present

Not present

  1. The target application must consult external files or configuration controls to control its execution. All but the very simplest applications meet this requirement.
  1. The attacker must have the access necessary to affect the files or other environment items the targeted application uses for its operations.

Not present

Not present

Not present