CAPEC Details
Name Hardware Integrity Attack
Likelyhood of attack Typical severity
Low High
Summary An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack.
Prerequisites Influence over the deployed system at a victim location.
Solutions
Taxonomy: ATTACK
Entry ID Entry Name
1195.003 Supply Chain Compromise: Compromise Hardware Supply Chain
1200 Hardware Additions