Adversaries can replace or generate encryption keys used to encrypt TM/TC in order to gain permanent access to other functionalities. [1]
Standard/references: [2] [3]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.