CAPEC-531 - Hardware Component Substitution After Installation

An attacker substitutes a maliciously-altered hardware component for a tested and approved component to a sub-system developer or integrator, allowing for malicious hardware to end up and the victim's location once an upgrade or repair is performed. The attacker can then cause disruption or additional compromise.

Severity

Likelihood

Confidentiality

Integrity

Availability

High level: Able to develop and manufacture malicious system components that perform the same functions and processes as their non-malicious counterparts.

Physical access to an sub-system developer or integration facility where hardware components are kept.