Dark Mode

Settings

Capec-517 Detail

Documentation Alteration to Circumvent Dial-down

Detailed Supply Chain Likelihood: Low Typical Severity: High

Parents: 447

Threats: T62 T68

Description

An attacker with access to a manufacturer's documentation, which include descriptions of advanced technology and/or specific components' criticality, alters the documents to circumvent dial-down functionality requirements. This alteration would change the interpretation of implementation and manufacturing techniques, allowing for advanced technologies to remain in place even though these technologies might be restricted to certain customers, such as nations on the terrorist watch list, giving the attacker on the receiving end of a shipped product access to an advanced technology that might otherwise be restricted.

Not present

External ID Source Link Description
CAPEC-517 capec https://capec.mitre.org/data/definitions/517.html
REF-439 reference_from_CAPEC http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf John F. Miller, Supply Chain Attack Framework and Attack Patterns, 2013, The MITRE Corporation
REF-715 reference_from_CAPEC https://nira.com/how-to-secure-your-documents/ Marie Prokopets, How To Secure Your Documents, Nira

Not present

  1. Advanced knowledge of internal software and hardware components within manufacturer's development environment.
  2. Access to the manufacturer's documentation.

Not present

High
Ability to stealthly gain access via remote compromise or physical access to the manufacturer's documentation.

Not present

  1. A product for manufacture exists that contains advanced cryptographic capabilities, including algorithms that are restricted from being shipped to some nations. An attacker from one of the restricted nations alters the documentation to ensure that when the product is manufactured for shipment to a restricted nation, the software compilation steps that normally would prevent the advanced cryptographic capabilities from being included are actually included. When the product is shipped to the attacker's home country, the attacker is able to retrieve and/or use the advanced cryptographic capabilities.