T1601.002 Downgrade System Image

Adversaries may install an older version of the operating system of a network device to weaken security. Older operating system versions on network devices often have weaker encryption ciphers and, in general, fewer/less updated defensive features. (Citation: Cisco Synful Knock Evolution)

On embedded devices, downgrading the version typically only requires replacing the operating system file in storage. With most embedded devices, this can be achieved by downloading a copy of the desired version of the operating system file and reconfiguring the device to boot from that file on next system restart. The adversary could then restart the device to implement the change immediately or they could wait until the next time the system restarts.

Downgrading the system image to an older versions may allow an adversary to evade defenses by enabling behaviors such as Weaken Encryption. Downgrading of a system image can be done on its own, or it can be used in conjunction with Patch System Image.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.IR-01.05 Remote access protection Mitigates T1601.002 Downgrade System Image
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
References
    PR.AA-05.02 Privileged system access Mitigates T1601.002 Downgrade System Image
    Comments
    This diagnostic statement protects against Downgrade System Image through the use of privileged account management and the use of multi-factor authentication.
    References
      DE.CM-09.01 Software and data integrity checking Mitigates T1601.002 Downgrade System Image
      Comments
      This diagnostic statement protects against Downgrade System Image through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
      References
        PR.PS-01.03 Configuration deviation Mitigates T1601.002 Downgrade System Image
        Comments
        This diagnostic statement provides protection from Downgrade System Image through the implementation of security configuration baselines for OS, software, file integrity monitoring and imaging. Security baselining and integrity checking can help protect against adversaries attempting to compromise and modify the system image.
        References
          PR.PS-01.07 Cryptographic keys and certificates Mitigates T1601.002 Downgrade System Image
          Comments
          This diagnostic statement protects against Downgrade System Image through the use of revocation of keys and key management. Employing key protection strategies and key management for key material used in managing and signing images, limitations to specific accounts along with access control mechanisms provides protection against adversaries attempting to modify or patch system images.
          References
            PR.AA-03.01 Authentication requirements Mitigates T1601.002 Downgrade System Image
            Comments
            This diagnostic statement describes how the organization implement appropriate authentication requirements, including selecting mechanisms based on risk, utilizing multi-factor authentication where necessary, and safeguarding the storage of authenticators like pins and passwords to protect sensitive access credentials.
            References
              EX.MM-01.01 Third-party monitoring and management resources Mitigates T1601.002 Downgrade System Image
              Comments
              This diagnostic statement provides for the implementation of procedures for management of third party products such as vendor provided digitally signed operating system images to validate the integrity of the software used on their platform.
              References
                PR.AA-01.01 Identity and credential management Mitigates T1601.002 Downgrade System Image
                Comments
                This diagnostic statement protects against Downgrade System Image through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
                References

                  NIST 800-53 Mappings

                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                  CM-06 Configuration Settings mitigates T1601.002 Downgrade System Image
                  CM-05 Access Restrictions for Change mitigates T1601.002 Downgrade System Image
                  IA-05 Authenticator Management mitigates T1601.002 Downgrade System Image
                  SA-10 Developer Configuration Management mitigates T1601.002 Downgrade System Image
                  IA-07 Cryptographic Module Authentication mitigates T1601.002 Downgrade System Image
                  RA-09 Criticality Analysis mitigates T1601.002 Downgrade System Image
                  SR-11 Component Authenticity mitigates T1601.002 Downgrade System Image
                  SR-04 Provenance mitigates T1601.002 Downgrade System Image
                  SR-05 Acquisition Strategies, Tools, and Methods mitigates T1601.002 Downgrade System Image
                  SC-34 Non-modifiable Executable Programs mitigates T1601.002 Downgrade System Image
                  SI-02 Flaw Remediation mitigates T1601.002 Downgrade System Image
                  CM-08 System Component Inventory mitigates T1601.002 Downgrade System Image
                  SI-07 Software, Firmware, and Information Integrity mitigates T1601.002 Downgrade System Image
                  CM-02 Baseline Configuration mitigates T1601.002 Downgrade System Image
                  CM-02 Baseline Configuration mitigates T1601.002 Downgrade System Image
                  SA-11 Developer Testing and Evaluation mitigates T1601.002 Downgrade System Image
                  IA-02 Identification and Authentication (Organizational Users) mitigates T1601.002 Downgrade System Image
                  CM-07 Least Functionality mitigates T1601.002 Downgrade System Image
                  SI-04 System Monitoring mitigates T1601.002 Downgrade System Image
                  AC-02 Account Management mitigates T1601.002 Downgrade System Image
                  AC-03 Access Enforcement mitigates T1601.002 Downgrade System Image
                  AC-04 Information Flow Enforcement mitigates T1601.002 Downgrade System Image
                  AC-05 Separation of Duties mitigates T1601.002 Downgrade System Image
                  AC-06 Least Privilege mitigates T1601.002 Downgrade System Image
                  CM-03 Configuration Change Control mitigates T1601.002 Downgrade System Image

                  VERIS Mappings

                  Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                  action.hacking.variety.Use of stolen creds Use of stolen or default authentication credentials (including credential stuffing) related-to T1601.002 Downgrade System Image
                  action.malware.variety.Disable controls Disable or interfere with security controls related-to T1601.002 Downgrade System Image