This weakness describes software that is vulnerable to infection by self-replicating malicious programs like viruses or worms. Once such malware compromises a system, it can use that system as a launchpad to automatically spread and attack others.
This vulnerability isn't about a single bug in your code, but about the overall environment your software creates. If your application has security flaws—like allowing arbitrary code execution or failing to validate inputs—it can become an unwitting host. Once malware exploits these flaws to gain a foothold, it leverages the compromised system's resources and network access to seek out and infect new targets, turning your software into a vector for a larger attack. For developers, the focus should be on building robust defenses that prevent initial compromise. This means rigorously implementing standard security practices: validating all inputs, enforcing the principle of least privilege, keeping components updated, and using anti-malware tools. By eliminating the entry points that malware exploits, you break the replication chain and protect not only your own system but also others on the network from becoming the next victim.
Impact: Execute Unauthorized Code or Commands