| Name | 
    Malicious Manual Software Update | 
  
  
     | 
    
      
        
        
          | Likelyhood of attack | 
          Typical severity | 
         
        
        
        
          | Low | 
          High | 
         
        
       
   | 
  
    | Summary | 
    An attacker introduces malicious code to the victim's system by altering the payload of a software update, allowing for additional compromise or site disruption at the victim location. These manual, or user-assisted attacks, vary from requiring the user to download and run an executable, to as streamlined as tricking the user to click a URL. Attacks which aim at penetrating a specific network infrastructure often rely upon secondary attack methods to achieve the desired impact. Spamming, for example, is a common method employed as an secondary attack vector. Thus the attacker has in their arsenal a choice of initial attack vectors ranging from traditional SMTP/POP/IMAP spamming and its varieties, to web-application mechanisms which commonly implement both chat and rich HTML messaging within the user interface. | 
  
  
    | Prerequisites | 
    Advanced knowledge about the download and update installation processes. Advanced knowledge about the deployed system and its various software subcomponents and processes. | 
  
  
   | Solutions          | Only accept software updates from an official source.     |  
  
   | Related Weaknesses | 
    
      
        
          
            | 
              CWE ID
             | 
            
              Description
             | 
           
        
        
        
          | CWE-494 | 
          Download of Code Without Integrity Check | 
         
        
       
     | 
  
  
  
   | Related CAPECS | 
    
      
        
          
            | 
              CAPEC ID
             | 
            
              Description
             | 
           
        
        
        
        
          | CAPEC-186 | 
          An adversary uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an adversary controlled source. | 
         
        
        
       
     |