Develop/Obtain Capabilities: Space Protocol Vulnerabilities

Adversaries may acquire information about vulnerabilities that can be used during targeting. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases. [1]

ID: T2007.008
Sub-technique of:  T2007
Platforms: Space Segment
Version: 2.0
Created: 25 August 2022
Last Modified: 05 February 2025

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References