Dark Mode
Capec-516 Detail
Hardware Component Substitution During Baselining
Detailed Supply Chain Hardware Likelihood: Low Typical Severity: High
Parents: 444
Threats: T62 T68 T274 T393
An adversary with access to system components during allocated baseline development can substitute a maliciously altered hardware component for a baseline component during the product development and research phases. This can lead to adjustments and calibrations being made in the product so that when the final product, now containing the modified component, is deployed it will not perform as designed and be advantageous to the adversary.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-516 | capec | https://capec.mitre.org/data/definitions/516.html | |
| T1195.003 | ATTACK | https://attack.mitre.org/wiki/Technique/T1195/003 | Supply Chain Compromise: Compromise Hardware Supply Chain |
| REF-439 | reference_from_CAPEC | http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf | John F. Miller, Supply Chain Attack Framework and Attack Patterns, 2013, The MITRE Corporation |
| REF-712 | reference_from_CAPEC | https://www.microsoft.com/security/blog/2020/02/03/guarding-against-supply-chain-attacks-part-2-hardware-risks/ | Cristin Goodwin, Joram Borenstein, Guarding against supply chain attacks—Part 2: Hardware risks, 2020--02---03, Microsoft |
Not present
- The adversary will need either physical access or be able to supply malicious hardware components to the product development facility.
Not present
| High | Medium |
|---|---|
| Resources to physically infiltrate supplier. | |
| Intelligence data on victim's purchasing habits. |
Not present
- An adversary supplies the product development facility of a network security device with a hardware component that is used to simulate large volumes of network traffic. The device claims in logs, stats, and via the display panel to be pumping out very large quantities of network traffic, when it is in fact putting out very low volumes. The developed product is adjusted and configured to handle what it believes to be a heavy network load, but when deployed at the victim site the large volumes of network traffic are dropped instead of being processed by the network security device. This allows the adversary an advantage when attacking the victim in that the adversary's presence may not be detected by the device.