If an attacker gains access to payload, he can execute telecommands; in addition, he can propagate the attack exploiting payload activities. [1]
| ID | Mitigation | Description |
|---|---|---|
| M2051 | On Board Authentication for executing critical commands | |
| M2057 | Payload specific countermeasures | |
| M2056 | Platform protection |