Read Time:24 Second

Description

The software appears to contain benign or useful functionality, but it also contains code that is hidden from normal operation that violates the intended security policy of the user or the system administrator.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-506

 

Consequences

Confidentiality, Integrity, Availability: Execute Unauthorized Code or Commands

 

Potential Mitigations

Phase: Operation

Description: 

Most antivirus software scans for Trojan Horses.

Phase: Installation

Description: 

Verify the integrity of the software that is being installed.

CVE References