Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-440:Hardware Integrity Attack
Attack Pattern ID:440
Version:v3.9
Attack Pattern Name:Hardware Integrity Attack
Abstraction:Meta
Status:Stable
Likelihood of Attack:Low
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ParentOfS401Physically Hacking Hardware
ParentOfS534Malicious Hardware Update
Nature: ParentOf
Type: Standard
ID: 401
Name: Physically Hacking Hardware
Nature: ParentOf
Type: Standard
ID: 534
Name: Malicious Hardware Update
▼Execution Flow
▼Prerequisites
Influence over the deployed system at a victim location.
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
IntegrityN/AExecute Unauthorized CommandsN/A
Scope: Integrity
Likelihood: N/A
Impact: Execute Unauthorized Commands
Note: N/A
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
ATTACK1195.003Supply Chain Compromise: Compromise Hardware Supply Chain
ATTACK1200Hardware Additions
Taxonomy Name: ATTACK
Entry ID: 1195.003
Entry Name: Supply Chain Compromise: Compromise Hardware Supply Chain
Taxonomy Name: ATTACK
Entry ID: 1200
Entry Name: Hardware Additions
▼Notes
▼References
Details not found