CAPEC-536: Data Injected During Configuration
An attacker with access to data files and processes on a victim's system injects malicious data into critical operational data during configuration or recalibration, causing the victim's system to perform in a suboptimal manner that benefits the adversary.
Severity
High
Likelihood
Low
6
/ 100
low-risk
Active Threat
5/50 · Minimal
Exploit Availability
1/50 · Minimal