Dark Mode
Capec-458 Detail
Flash Memory Attacks
Detailed Software Hardware
Parents: 456
Threats: T79 T287 T337 T369 T391 T406
An adversary inserts malicious logic into a product or technology via flashing the on-board memory with a code-base that contains malicious logic. Various attacks exist against the integrity of flash memory, the most direct being rootkits coded into the BIOS or chipset of a device.
Such attacks are very difficult to detect because the malicious code resides outside the filesystem or RAM, and in the underlying byte-code that drives the processor. Many devices, such as the recent attacks against digital picture frames, contain only a microprocessor and a small amount of solid-state memory, rendering these devices ideal for "flash" based malware or malicious logic. One of the pernicious characteristics of flash memory based attacks is that the malicious code can survive even a total format of the hard-drive and reinstallation of the host operating system. Virtually any device which can be integrated into a computer system is susceptible to these attacks. Additionally, any peripheral device which interfaces with the computer bus could extract or sniff confidential data, even on systems employing full-disk encryption. Trojan code placed into a video card's chipset would continue to perform its function irrespective of the host operating system, and would be invisible to all known antivirus. The threats extend to consumer products such as camcorders, digital cameras, or any consumer electronic device with an embedded microcontroller.
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-458 | capec | https://capec.mitre.org/data/definitions/458.html | |
| CWE-1282 | cwe | http://cwe.mitre.org/data/definitions/1282.html | |
| REF-379 | reference_from_CAPEC | https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-161r1-draft2.pdf | Jon Boyens, Angela Smith, Nadya Bartol, Kris Winkler, Alex Holbrook, Matthew Fallon, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (2nd Draft), 2021--10---28, National Institute of Standards and Technology (NIST) |
| REF-394 | reference_from_CAPEC | Robert Lemos, Researchers: Rootkits headed for BIOS, 2006, SecurityFocus |
Not present
Not present
Not present
Not present
Not present
Not present