CAPEC 446 Malicious Logic Insertion into Product via Inclusion of Third-Party Component

Stable Detailed Medium Risk
Severity High

Description

{'xhtml:p': 'An adversary conducts supply chain attacks by the inclusion of insecure third-party components into a technology, product, or code-base, possibly packaging a malicious driver or component along with the product before shipping it to the consumer or acquirer.'}

Mitigations

2

Consequences

Relationships

Related ATT&CK Techniques

1