CAPEC-558: Replace Trusted Executable
An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called.
Severity
High
Likelihood
Low
6
/ 100
low-risk
Active Threat
5/50 · Minimal
Exploit Availability
1/50 · Minimal