| Name |
Hardware Integrity Attack |
|
| Likelyhood of attack |
Typical severity |
| Low |
High |
|
| Summary |
An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack. |
| Prerequisites |
Influence over the deployed system at a victim location. |
| Solutions | |
| Taxonomy: ATTACK |
|
Entry ID
|
Entry Name
|
| 1195.003 |
Supply Chain Compromise: Compromise Hardware Supply Chain |
| 1200 |
Hardware Additions |
|