Dark Mode
Capec-517 Detail
Documentation Alteration to Circumvent Dial-down
Detailed Supply Chain Likelihood: Low Typical Severity: High
Parents: 447
Threats: T62 T68
An attacker with access to a manufacturer's documentation, which include descriptions of advanced technology and/or specific components' criticality, alters the documents to circumvent dial-down functionality requirements. This alteration would change the interpretation of implementation and manufacturing techniques, allowing for advanced technologies to remain in place even though these technologies might be restricted to certain customers, such as nations on the terrorist watch list, giving the attacker on the receiving end of a shipped product access to an advanced technology that might otherwise be restricted.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-517 | capec | https://capec.mitre.org/data/definitions/517.html | |
| REF-439 | reference_from_CAPEC | http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf | John F. Miller, Supply Chain Attack Framework and Attack Patterns, 2013, The MITRE Corporation |
| REF-715 | reference_from_CAPEC | https://nira.com/how-to-secure-your-documents/ | Marie Prokopets, How To Secure Your Documents, Nira |
Not present
- Advanced knowledge of internal software and hardware components within manufacturer's development environment.
- Access to the manufacturer's documentation.
Not present
| High |
|---|
| Ability to stealthly gain access via remote compromise or physical access to the manufacturer's documentation. |
Not present
- A product for manufacture exists that contains advanced cryptographic capabilities, including algorithms that are restricted from being shipped to some nations. An attacker from one of the restricted nations alters the documentation to ensure that when the product is manufactured for shipment to a restricted nation, the software compilation steps that normally would prevent the advanced cryptographic capabilities from being included are actually included. When the product is shipped to the attacker's home country, the attacker is able to retrieve and/or use the advanced cryptographic capabilities.