T1601 Modify System Image Mappings

Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves. On such devices, the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file.

To change the operating system, the adversary typically only needs to affect this one file, replacing or modifying it. This can either be done live in memory during system runtime for immediate effect, or in storage to implement the change on the next boot of the network device.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-2 Account Management Protects T1601 Modify System Image
AC-3 Access Enforcement Protects T1601 Modify System Image
AC-4 Information Flow Enforcement Protects T1601 Modify System Image
AC-5 Separation of Duties Protects T1601 Modify System Image
AC-6 Least Privilege Protects T1601 Modify System Image
CA-8 Penetration Testing Protects T1601 Modify System Image
CM-2 Baseline Configuration Protects T1601 Modify System Image
CM-3 Configuration Change Control Protects T1601 Modify System Image
CM-5 Access Restrictions for Change Protects T1601 Modify System Image
CM-6 Configuration Settings Protects T1601 Modify System Image
CM-7 Least Functionality Protects T1601 Modify System Image
CM-8 System Component Inventory Protects T1601 Modify System Image
IA-2 Identification and Authentication (organizational Users) Protects T1601 Modify System Image
IA-5 Authenticator Management Protects T1601 Modify System Image
IA-7 Cryptographic Module Authentication Protects T1601 Modify System Image
RA-9 Criticality Analysis Protects T1601 Modify System Image
SA-10 Developer Configuration Management Protects T1601 Modify System Image
SA-11 Developer Testing and Evaluation Protects T1601 Modify System Image
SC-34 Non-modifiable Executable Programs Protects T1601 Modify System Image
SI-2 Flaw Remediation Protects T1601 Modify System Image
SI-4 System Monitoring Protects T1601 Modify System Image
SI-7 Software, Firmware, and Information Integrity Protects T1601 Modify System Image
SR-11 Component Authenticity Protects T1601 Modify System Image
SR-4 Provenance Protects T1601 Modify System Image
SR-5 Acquisition Strategies, Tools, and Methods Protects T1601 Modify System Image
SR-6 Supplier Assessments and Reviews Protects T1601 Modify System Image
action.malware.variety.Disable controls Disable or interfere with security controls related-to T1601 Modify System Image

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1601.002 Downgrade System Image 27
T1601.001 Patch System Image 27