CAPEC Details
Name Local Execution of Code
Likelyhood of attack Typical severity
Medium High
Summary An adversary installs and executes malicious code on the target system in an effort to achieve a negative technical impact. Examples include rootkits, ransomware, spyware, adware, and others.
Prerequisites Knowledge of the target system's vulnerabilities that can be capitalized on with malicious code.The adversary must be able to place the malicious code on the target system.
Solutions Employ robust cybersecurity training for all employees. Implement system antivirus software that scans all attachments before opening them. Regularly patch all software. Execute all suspicious files in a sandbox environment.
Related Weaknesses
CWE ID Description
CWE-829 Inclusion of Functionality from Untrusted Control Sphere