CAPEC 440 Hardware Integrity Attack

Stable Meta Low Risk
Severity High

Description

An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack.

Consequences

Relationships

Related ATT&CK Techniques

2