CAPEC-538: Open-Source Library Manipulation
Adversaries implant malicious code in open source software (OSS) libraries to have it widely distributed, as OSS is commonly downloaded by developers and other users to incorporate into software development projects. The adversary can have a particular system in mind to target, or the implantation can be the first stage of follow-on attacks on many systems.
Severity
High
Likelihood
Low
11
/ 100
low-risk
Active Threat
10/50 · Low
Exploit Availability
1/50 · Minimal