T1601.002 Downgrade System Image Mappings

Adversaries may install an older version of the operating system of a network device to weaken security. Older operating system versions on network devices often have weaker encryption ciphers and, in general, fewer/less updated defensive features. (Citation: Cisco Synful Knock Evolution)

On embedded devices, downgrading the version typically only requires replacing the operating system file in storage. With most embedded devices, this can be achieved by downloading a copy of the desired version of the operating system file and reconfiguring the device to boot from that file on next system restart. The adversary could then restart the device to implement the change immediately or they could wait until the next time the system restarts.

Downgrading the system image to an older versions may allow an adversary to evade defenses by enabling behaviors such as Weaken Encryption. Downgrading of a system image can be done on its own, or it can be used in conjunction with Patch System Image.

View in MITRE ATT&CK®

NIST 800-53 Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CM-06 Configuration Settings mitigates T1601.002 Downgrade System Image
CM-05 Access Restrictions for Change mitigates T1601.002 Downgrade System Image
IA-05 Authenticator Management mitigates T1601.002 Downgrade System Image
SA-10 Developer Configuration Management mitigates T1601.002 Downgrade System Image
IA-07 Cryptographic Module Authentication mitigates T1601.002 Downgrade System Image
RA-09 Criticality Analysis mitigates T1601.002 Downgrade System Image
SR-11 Component Authenticity mitigates T1601.002 Downgrade System Image
SR-04 Provenance mitigates T1601.002 Downgrade System Image
SR-05 Acquisition Strategies, Tools, and Methods mitigates T1601.002 Downgrade System Image
SC-34 Non-modifiable Executable Programs mitigates T1601.002 Downgrade System Image
SI-02 Flaw Remediation mitigates T1601.002 Downgrade System Image
CM-08 System Component Inventory mitigates T1601.002 Downgrade System Image
SI-07 Software, Firmware, and Information Integrity mitigates T1601.002 Downgrade System Image
CM-02 Baseline Configuration mitigates T1601.002 Downgrade System Image
CM-02 Baseline Configuration mitigates T1601.002 Downgrade System Image
SA-11 Developer Testing and Evaluation mitigates T1601.002 Downgrade System Image
IA-02 Identification and Authentication (Organizational Users) mitigates T1601.002 Downgrade System Image
CM-07 Least Functionality mitigates T1601.002 Downgrade System Image
SI-04 System Monitoring mitigates T1601.002 Downgrade System Image
AC-02 Account Management mitigates T1601.002 Downgrade System Image
AC-03 Access Enforcement mitigates T1601.002 Downgrade System Image
AC-04 Information Flow Enforcement mitigates T1601.002 Downgrade System Image
AC-05 Separation of Duties mitigates T1601.002 Downgrade System Image
AC-06 Least Privilege mitigates T1601.002 Downgrade System Image
CM-03 Configuration Change Control mitigates T1601.002 Downgrade System Image

VERIS Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.hacking.variety.Use of stolen creds Use of stolen or default authentication credentials (including credential stuffing) related-to T1601.002 Downgrade System Image
action.malware.variety.Disable controls Disable or interfere with security controls related-to T1601.002 Downgrade System Image