CAPEC-677 Server Motherboard Compromise

CAPEC ID: 677

CAPEC-677 Metadata

Likelihood of Attack

Low

Typical Severity

High

Overview

Summary

Malware is inserted in a server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. The development environment or hardware/software support activity environment is susceptible to an adversary inserting malicious software into hardware components during development or update.

Prerequisites

An adversary with access to hardware/software processes and tools within the development or hardware/software support environment can insert malicious software into hardware components during development or update/maintenance.

Potential Solutions / Mitigations

Purchase IT systems, components and parts from government approved vendors whenever possible. Establish diversity among suppliers. Conduct rigorous threat assessments of suppliers. Require that Bills of Material (BoM) for critical parts and components be certified. Utilize contract language requiring contractors and subcontractors to flow down to subcontractors and suppliers SCRM and SCRA (Supply Chain Risk Assessment) requirements. Establish trusted supplier networks.

Related CAPECs

CAPEC ID Description
CAPEC-534 An adversary introduces malicious hardware during an update or replacement procedure, allowing for additional compromise or site disruption at the victim location. After deployment, it is not uncommon for upgrades and replacements to occur involving hardware and various replaceable parts. These upgrades and replacements are intended to correct defects, provide additional features, and to replace broken or worn-out parts. However, by forcing or tricking the replacement of a good component with a defective or corrupted component, an adversary can leverage known defects to obtain a desired malicious impact.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1195.003 Supply Chain Compromise: Compromise Hardware Supply Chain

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.