SV-AC-8

Malicious Use of hardware commands - backdoors / critical commands


Informational References

ID: SV-AC-8
DiD Layer: SBC
CAPEC #:  88 | 248
NIST Rev5 Control Tag Mapping:  AC-3 | AC-3(11) | AC-14 | AC-17 | AC-17(10) | CM-12 | CM-12(1) | CP-4 | CP-4(5) | RA-3 | RA-3(3) | SA-3 | SA-3(1) | SA-8 | SA-8(9) | SA-8(15) | SA-8(24) | SA-11 | SA-11(9) | SI-10 | SI-10(3) | SI-10(6)
Lowest Threat Tier to
Create Threat Event:  
III
Notional Risk Rank Score: 

High-Level Requirements

The Program shall ensure all hardware/backdoor commands available for use by the spacecraft are as expected.

Low-Level Requirements

Requirement Rationale/Additional Guidance/Notes
The Program shall perform analysis of critical (backdoor) commands that could adversely affect mission success if used maliciously. {SV-AC-8} {SI-10,SI-10(3)} The intent is protect against misuse of critical commands. On potential scenario is where you could use accounts with different privileges, could require an additional passphrase or require entry into a different state or append an additional footer to a critical command. There is room for design flexibility here that can still satisfy this requirement.
The spacecraft shall only use or include [Program-defined] critical commands for the purpose of providing emergency access where commanding authority is appropriately restricted. {SV-AC-8} {SI-10,SI-10(3)} This is a concern for bus re-use. It is possible that the manufacturer left previously coded commands in their syntax rather than starting from a clean slate. This leaves potential backdoors and other functionality the mission does not know about.
The Program shall ensure that all viable commands are known to the mission and SV "owner. {SV-AC-8} {SI-10,SI-10(3)}

Related SPARTA Techniques and Sub-Techniques

ID Name Description
EX-0003 Modify Authentication Process Threat actors may modify the internal authentication process of the victim SV to facilitate initial access, recurring execution, or prevent authorized entities from accessing the SV. This can be done through the modification of the software binaries or memory manipulation techniques.
EX-0005 Exploit Hardware/Firmware Corruption Threat actors can target the underlying hardware and/or firmware using various TTPs that will be dependent on the specific hardware/firmware. Typically, software tools (e.g., antivirus, antimalware, intrusion detection) can protect a system from threat actors attempting to take advantage of those vulnerabilities to inject malicious code. However, there exist security gaps that cannot be closed by the above-mentioned software tools since they are not stationed on software applications, drivers or the operating system but rather on the hardware itself. Hardware components, like memory modules and caches, can be exploited under specific circumstances thus enabling backdoor access to potential threat actors. In addition to hardware, the firmware itself which often is thought to be software in its own right also provides an attack surface for threat actors. Firmware is programming that's written to a hardware device's non-volatile memory where the content is saved when a hardware device is turned off or loses its external power source. Firmware is written directly onto a piece of hardware during manufacturing and it is used to run on the device and can be thought of as the software that enables hardware to run. In the space vehicle context, firmware and field programmable gate array (FPGA)/application-specific integrated circuit (ASIC) logic/code is considered equivalent to firmware.
EX-0005.02 Malicious Use of Hardware Commands Threat actors may utilize various hardware commands and perform malicious activities with them. Hardware commands typically differ from traditional command channels as they bypass many of the traditional protections and pathways and are more direct therefore they can be dangerous if not protected. Hardware commands are sometime a necessity to perform various actions such as configuring sensors, adjusting positions, and rotating internal motors. Threat actors may use these commands to perform malicious activities that can damage the victim SV in some capacity.
EX-0006 Disable/Bypass Encryption Threat actors may perform specific techniques in order to bypass or disable the encryption mechanism onboard the victim SV. By bypassing or disabling this particular mechanism, further tactics can be performed, such as Exfiltration, that may have not been possible with the internal encryption process in place.
PER-0002 Backdoor Threat actors may find and target various backdoors, or inject their own, within the victim SV in the hopes of maintaining their attack.
PER-0002.01 Hardware Threat actors may find and target various hardware backdoors within the victim SV in the hopes of maintaining their attack. Once in orbit, mitigating the risk of various hardware backdoors becomes increasingly difficult for ground controllers. By targeting these specific vulnerabilities, threat actors are more likely to remain persistent on the victim SV and perpetuate further attacks.

Related SPARTA Countermeasures

ID Name Description NIST Rev5 D3FEND ISO 27001