Dark Mode

Settings

Capec-534 Detail

Malicious Hardware Update

Standard Supply Chain Physical Security Hardware Likelihood: Low Typical Severity: High

Parents: 440

Children: 531 677

Threats: T62 T78

Description

An adversary introduces malicious hardware during an update or replacement procedure, allowing for additional compromise or site disruption at the victim location. After deployment, it is not uncommon for upgrades and replacements to occur involving hardware and various replaceable parts. These upgrades and replacements are intended to correct defects, provide additional features, and to replace broken or worn-out parts. However, by forcing or tricking the replacement of a good component with a defective or corrupted component, an adversary can leverage known defects to obtain a desired malicious impact.

Not present

External ID Source Link Description
CAPEC-534 capec https://capec.mitre.org/data/definitions/534.html
REF-439 reference_from_CAPEC http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf John F. Miller, Supply Chain Attack Framework and Attack Patterns, 2013, The MITRE Corporation
REF-711 reference_from_CAPEC https://www.usenix.org/system/files/conference/woot17/woot17-paper-shwartz.pdf Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren, Shattered Trust: When Replacement Smartphone Components Attack, 11th USENIX Workshop on Offensive Technologies, 2017, USENIX

Not present

Not present

Not present

High
Able to develop and manufacture malicious hardware components that perform the same functions and processes as their non-malicious counterparts.

Not present

  1. An adversary develops a malicious networking card that allows for normal function plus the addition of malicious functionality that is of benefit to the adversary. The adversary sends the victim an email stating that the existing networking card is faulty, and that the victim can order a replacement card free of charge. The victim orders the card, and the adversary sends the malicious networking card. The malicious networking card replaces the perfectly-functioning original networking card, and the adversary is able to take advantage of the additional malicious functionality to further compromise the victim's network.