CAPEC-516: Hardware Component Substitution During Baselining

Detailed Draft 严重程度: High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary with access to system components during allocated baseline development can substitute a maliciously altered hardware component for a baseline component during the product development and research phases. This can lead to adjustments and calibrations being made in the product so that when the final product, now containing the modified component, is deployed it will not perform as designed and be advantageous to the adversary.

前提条件

  • The adversary will need either physical access or be able to supply malicious hardware components to the product development facility.

所需技能

Medium Intelligence data on victim's purchasing habits.
High Resources to maliciously construct/alter hardware components used for testing by the supplier.
High Resources to physically infiltrate supplier.

缓解措施

Hardware attacks are often difficult to detect, as inserted components can be difficult to identify or remain dormant for an extended period of time.

Acquire hardware and hardware components from trusted vendors. Additionally, determine where vendors purchase components or if any components are created/acquired via subcontractors to determine where supply chain risks may exist.

分类映射

分类名称 条目ID 条目名称
ATTACK 1195.003 Supply Chain Compromise: Compromise Hardware Supply Chain
关键信息

CAPEC ID: CAPEC-516

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: Low

相关攻击模式