Critical Infrastructure Cybersecurity Framework
T1495Impact3 Mitigations

Firmware Corruption

Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system.

Description

Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Boot IntegrityPrivileged Account ManagementUpdate Software

Quick Info

Technique ID
T1495
Tactic
Impact
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.