Dark Mode
Capec-447 Detail
Design Alteration
Standard Supply Chain Hardware Likelihood: Medium Typical Severity: High
Parents: 438
Children: 517 518 519 521 671 674
Threats: T62 T68 T274 T393
An adversary modifies the design of a technology, product, or component to acheive a negative impact once the system is deployed. In this type of attack, the goal of the adversary is to modify the design of the system, prior to development starting, in such a way that the negative impact can be leveraged when the system is later deployed. Design alteration attacks differ from development alteration attacks in that design alteration attacks take place prior to development and which then may or may not be developed by the adverary. Design alteration attacks include modifying system designs to degrade system performance, cause unexpected states or errors, and general design changes that may lead to additional vulnerabilities. These attacks generally require insider access to modify design documents, but they may also be spoofed via web communications. The product is then developed and delivered to the user where the negative impact can be leveraged at a later time.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-447 | capec | https://capec.mitre.org/data/definitions/447.html |
Not present
- Access to system design documentation prior to the development phase. This access is often obtained via insider access or by leveraging another attack pattern to gain permissions that the adversary wouldn't normally have.
- Ability to forge web communications to deliver modified design documentation.
Not present
Not present
| Integrity | Availability | Authorization |
|---|---|---|
| Alter Execution Logic | Unreliable Execution | Execute Unauthorized Commands |
Not present