Common Information
Type Value
Value
Firmware - T1592.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's host firmware that can be used during targeting. Information about host firmware may include a variety of details such as type and versions on specific hosts, which may be used to infer more information about hosts in the environment (ex: configuration, purpose, age/patch level, etc.). Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about host firmware may only be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices).(Citation: ArsTechnica Intel) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)).
Details Published Attributes CTI Title
Details Website 2031-03-19 15 HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support
Details Website 2024-12-28 0 BRICKED SSD ON LIFE SUPPORT — FMADIO
Details Website 2024-11-17 0 "Navigating the future of digital security: How evolving threats, advanced AI, and new protection…
Details Website 2024-11-17 3 LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected
Details Website 2024-11-16 0 Cybersecurity 2024: Emerging Trends and Challenging Threats to Look Out for
Details Website 2024-11-16 0 Best Practices for Maintaining Cybersecurity in a Home Office
Details Website 2024-11-16 0 Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-16 0 Cybersecurity Tips for Digital Safety
Details Website 2024-11-16 0 How Internet Security Protects You from Cyber Threats
Details Website 2024-11-15 0 Understanding the GeoVision Zero-Day Exploit and Mirai Malware Botnet
Details Website 2024-11-15 12 Cybersecurity News Review — Week 46
Details Website 2024-11-15 0 Marvis Client provides device-to-cloud visibility to optimize Wi-Fi experiences | Official Juniper Networks Blogs
Details Website 2024-11-15 2 Critical TP-Link DHCP Vulnerability Let Attackers Execute Remote Code
Details Website 2024-11-15 0 NIST Reveals 98 Ways Your Hardware Can Be Hacked | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-15 0 Safeguarding Healthcare Organizations from IoMT Risks
Details Website 2024-11-15 5 The Good, the Bad and the Ugly in Cybersecurity - Week 46
Details Website 2024-11-15 0 Guardians of Patient Data: A Cybersecurity Checklist for Small Healthcare Providers
Details Website 2024-11-15 13 Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575
Details Website 2024-11-14 0 Revisiting Battery Safety
Details Website 2024-11-14 0 Why IoT Device Security Matters: Protecting Your Smart Devices
Details Website 2024-11-14 3 Angriffserkennung in der OT: Wie geht das?
Details Website 2024-11-13 0 Cybersecurity in the Age of IoT: Threats and Solutions
Details Website 2024-11-13 0 2024’s Most Common Cyber Threats and How to Defend Against Them
Details Website 2024-11-13 0 How to Protect Yourself and Your Business from Cyber Attacks in 2025
Details Website 2024-11-13 7 These 20 D-Link Devices Have Critical RCE Bug — but NO Patch NEVER