Dark Mode
Capec-452 Detail
Infected Hardware
Standard Software Hardware Likelihood: Medium Typical Severity: High
Parents: 441
Children: 638
Threats: T79 T287 T337 T391 T406
An adversary inserts malicious logic into hardware, typically in the form of a computer virus or rootkit. This logic is often hidden from the user of the hardware and works behind the scenes to achieve negative impacts. This pattern of attack focuses on hardware already fielded and used in operation as opposed to hardware that is still under development and part of the supply chain.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-452 | capec | https://capec.mitre.org/data/definitions/452.html |
Not present
- Access to the hardware currently deployed at a victim location.
Not present
Not present
| Authorization |
|---|
| Execute Unauthorized Commands |
Not present