Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-452:Infected Hardware
Attack Pattern ID:452
Version:v3.9
Attack Pattern Name:Infected Hardware
Abstraction:Standard
Status:Stable
Likelihood of Attack:Medium
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary inserts malicious logic into hardware, typically in the form of a computer virus or rootkit. This logic is often hidden from the user of the hardware and works behind the scenes to achieve negative impacts. This pattern of attack focuses on hardware already fielded and used in operation as opposed to hardware that is still under development and part of the supply chain.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfM441Malicious Logic Insertion
ParentOfD638Altered Component Firmware
Nature: ChildOf
Type: Meta
ID: 441
Name: Malicious Logic Insertion
Nature: ParentOf
Type: Detailed
ID: 638
Name: Altered Component Firmware
▼Execution Flow
▼Prerequisites
Access to the hardware currently deployed at a victim location.
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
AuthorizationN/AExecute Unauthorized CommandsN/A
Scope: Authorization
Likelihood: N/A
Impact: Execute Unauthorized Commands
Note: N/A
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Details not found