Common Information
Type | Value |
---|---|
Value |
Firmware - T1592.003 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host firmware that can be used during targeting. Information about host firmware may include a variety of details such as type and versions on specific hosts, which may be used to infer more information about hosts in the environment (ex: configuration, purpose, age/patch level, etc.). Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about host firmware may only be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).(Citation: ArsTechnica Intel) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2037-10-13 | 14 | Abusing IP camera's for red teaming: Obtaining the firmware | ||
Details | Website | 2031-03-19 | 15 | HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support | ||
Details | Website | 2025-01-22 | 4 | Three New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations | ||
Details | Website | 2025-01-22 | 5 | JVN#15293958: Multiple vulnerabilities in I-O DATA router UD-LT2 | ||
Details | Website | 2025-01-22 | 0 | New controls to keep students and educators safer online | ||
Details | Website | 2025-01-21 | 0 | What Is Computer Network Security? | ||
Details | Website | 2025-01-21 | 0 | What Is Computer Network Security? | ||
Details | Website | 2025-01-21 | 0 | Securing the Future: Why AI-Driven Human-Machine Interaction Demands Robust Cybersecurity Measures | ||
Details | Website | 2025-01-21 | 0 | The blockchain decentralized misconception | ||
Details | Website | 2025-01-21 | 0 | 10 Common Cybersecurity Myths and the Truth Behind Them | ||
Details | Website | 2025-01-21 | 1 | PoC Exploit released for TP-Link Code Execution Vulnerability(CVE-2024-54887) | ||
Details | Website | 2025-01-21 | 2 | New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers | ||
Details | Website | 2025-01-21 | 2 | The Evolving Landscape of Cybersecurity: The Fortinet Firewall Incident | ||
Details | Website | 2025-01-21 | 0 | Breaking into Servers via Remote Management Systems in 5 Mins💀 | ||
Details | Website | 2025-01-21 | 0 | Cyber Threats to Watch For in 2025 | ||
Details | Website | 2025-01-21 | 0 | Cybersecurity Breach: 13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks | ||
Details | Website | 2025-01-21 | 0 | Opinion: Trump 2.0 means AI is now dangerously unbound | ||
Details | Website | 2025-01-21 | 1 | High Severity Vulnerability Discovered in CP Plus Router: Immediate Attention Needed | ||
Details | Website | 2025-01-21 | 113 | Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog | ||
Details | Website | 2025-01-21 | 2 | PoC Exploit released for TP-Link Code Execution Vulnerability(CVE-2024-54887) | ||
Details | Website | 2025-01-21 | 0 | 2025’s Craziest Cyberattack: AI-Hijacked Drones Turn Into a Corporate Nightmare | ||
Details | Website | 2025-01-20 | 0 | The Evolving Security Landscape of AI-Powered Smart Glasses: Risks and Protective Measures | ||
Details | Website | 2025-01-20 | 10 | Looking at the Attack Surfaces of the Pioneer DMH-WT7600NEX IVI | ||
Details | Website | 2025-01-20 | 2 | Cyber Briefing: 2025.01.20 | ||
Details | Website | 2025-01-20 | 1 | New IoT Botnet Launches large-scale DDoS attacks Hijacking IoT Devices |