Mobile Threat Catalogue

Component Substitution During Software Upgrade

Contribute

Threat Category: Supply Chain

ID: SPC-20

Threat Description: An adversary with access to a software support activity can substitute malicious software for a legitimate component during a software upgrade.1

Threat Origin

Supply Chain Attack Framework and Attack Patterns 1

Exploit Examples

Not Applicable

CVE Examples

Not Applicable

Possible Countermeasures

References

  1. J.F. Miller, “Supply Chain Attack Framework and Attack Patterns”, tech. report, MITRE, Dec. 2013; www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf  2