{'xhtml:p': 'An adversary conducts supply chain attacks by the inclusion of insecure third-party components into a technology, product, or code-base, possibly packaging a malicious driver or component along with the product before shipping it to the consumer or acquirer.'}
Description
Mitigations
2
Consequences
Relationships
Related ATT&CK Techniques
1