An attacker with access to download and update system software sends a maliciously altered BIOS to the victim or victim supplier/integrator, which when installed allows for future exploitation.
Description
Mitigations
6
Consequences
Relationships
Related ATT&CK Techniques
2