Common Information
Type Value
Value
Firmware - T1592.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's host firmware that can be used during targeting. Information about host firmware may include a variety of details such as type and versions on specific hosts, which may be used to infer more information about hosts in the environment (ex: configuration, purpose, age/patch level, etc.). Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about host firmware may only be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).(Citation: ArsTechnica Intel) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)).
Details Published Attributes CTI Title
Details Website 2037-10-13 14 Abusing IP camera's for red teaming: Obtaining the firmware
Details Website 2031-03-19 15 HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support
Details Website 2025-01-22 4 Three New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations
Details Website 2025-01-22 5 JVN#15293958: Multiple vulnerabilities in I-O DATA router UD-LT2
Details Website 2025-01-22 0 New controls to keep students and educators safer online
Details Website 2025-01-21 0 What Is Computer Network Security?
Details Website 2025-01-21 0 What Is Computer Network Security?
Details Website 2025-01-21 0 Securing the Future: Why AI-Driven Human-Machine Interaction Demands Robust Cybersecurity Measures
Details Website 2025-01-21 0 The blockchain decentralized misconception
Details Website 2025-01-21 0 10 Common Cybersecurity Myths and the Truth Behind Them
Details Website 2025-01-21 1 PoC Exploit released for TP-Link Code Execution Vulnerability(CVE-2024-54887)
Details Website 2025-01-21 2 New Mirai Malware Variant Targets AVTECH Cameras, Huawei Routers
Details Website 2025-01-21 2 The Evolving Landscape of Cybersecurity: The Fortinet Firewall Incident
Details Website 2025-01-21 0 Breaking into Servers via Remote Management Systems in 5 Mins💀
Details Website 2025-01-21 0 Cyber Threats to Watch For in 2025
Details Website 2025-01-21 0 Cybersecurity Breach: 13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Details Website 2025-01-21 0 Opinion: Trump 2.0 means AI is now dangerously unbound
Details Website 2025-01-21 1 High Severity Vulnerability Discovered in CP Plus Router: Immediate Attention Needed
Details Website 2025-01-21 113 Mass Campaign of Murdoc Botnet Mirai: A New Variant of Corona Mirai | Qualys Security Blog
Details Website 2025-01-21 2 PoC Exploit released for TP-Link Code Execution Vulnerability(CVE-2024-54887)
Details Website 2025-01-21 0 2025’s Craziest Cyberattack: AI-Hijacked Drones Turn Into a Corporate Nightmare
Details Website 2025-01-20 0 The Evolving Security Landscape of AI-Powered Smart Glasses: Risks and Protective Measures
Details Website 2025-01-20 10 Looking at the Attack Surfaces of the Pioneer DMH-WT7600NEX IVI
Details Website 2025-01-20 2 Cyber Briefing: 2025.01.20
Details Website 2025-01-20 1 New IoT Botnet Launches large-scale DDoS attacks Hijacking IoT Devices