Name |
Physically Hacking Hardware |
|
Likelyhood of attack |
Typical severity |
Low |
High |
|
Summary |
An adversary exploits a weakness in access control to gain access to currently installed hardware and precedes to implement changes or secretly replace a hardware component which undermines the system's integrity for the purpose of carrying out an attack. |
Prerequisites |
|
Solutions | |
Related Weaknesses |
CWE ID
|
Description
|
CWE-1263 |
Improper Physical Access Control |
|
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-440 |
An adversary exploits a weakness in the system maintenance process and causes a change to be made to a technology, product, component, or sub-component or a new one installed during its deployed use at the victim location for the purpose of carrying out an attack. |
|