Hardware Additions

Adversaries may gain initial access to vehicle systems by exploiting hardware additions. This could involve manipulating or adding physical components to the vehicle's systems in order to gain unauthorized access.

For example, adversaries may discover a debug port on the board, such as UART, and connect to the UART port. This connection could then be used to gain unauthorized access to the system, obtain boot logs, debug logs, and potentially manipulate the system.

In the context of vehicle cybersecurity, hardware additions pose a significant threat as they can provide adversaries with a direct and physical means of compromising the vehicle's systems.

ID: T2007
Sub-techniques:  No sub-techniques
Tactic: Initial Access
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1200

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.