Name | Replace Trusted Executable | ||||
Summary | An adversary exploits weaknesses in privilege management or access control to replace a trusted executable with a malicious version and enable the execution of malware when that trusted executable is called. | ||||
Prerequisites | |||||
Solutions | |||||
Related Weaknesses |
|