CAPEC-536 - Data Injected During Configuration

An attacker with access to data files and processes on a victim's system injects false data into critical operational data during configuration or recalibration, causing the victim's system to perform in a suboptimal manner that benefits the attacker.

Severity

Likelihood

Confidentiality

Integrity

Availability

High level: Ability to generate and inject false data into operational data into a system with the intent of causing the victim to alter the configuration of the system.

The attacker must have previously compromised the victim's systems or have physical access to the victim's systems.

Advanced knowledge of software and hardware capabilities of a manufacturer's product.