CAPEC-440 Hardware Integrity Attack

CAPEC ID: 440

CAPEC-440 Metadata

Likelihood of Attack

Low

Typical Severity

High

Overview

Summary

An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack.

Prerequisites

Influence over the deployed system at a victim location.

Potential Solutions / Mitigations

No specific solutions listed.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1195.003 Supply Chain Compromise: Compromise Hardware Supply Chain
1200 Hardware Additions

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.