Dark Mode

Settings

Capec-452 Detail

Infected Hardware

Standard Software Hardware Likelihood: Medium Typical Severity: High

Parents: 441

Children: 638

Threats: T79 T287 T337 T391 T406

Description

An adversary inserts malicious logic into hardware, typically in the form of a computer virus or rootkit. This logic is often hidden from the user of the hardware and works behind the scenes to achieve negative impacts. This pattern of attack focuses on hardware already fielded and used in operation as opposed to hardware that is still under development and part of the supply chain.

Not present

External ID Source Link Description
CAPEC-452 capec https://capec.mitre.org/data/definitions/452.html

Not present

  1. Access to the hardware currently deployed at a victim location.

Not present

Not present

Authorization
Execute Unauthorized Commands

Not present