CAPEC 531 Hardware Component Substitution

Draft Detailed Low Risk
Severity High

Description

An attacker substitutes out a tested and approved hardware component for a maliciously-altered hardware component. This type of attack is carried out directly on the system, enabling the attacker to then cause disruption or additional compromise.

Consequences

Relationships

Related ATT&CK Techniques

1