Skip to content

Hide Navigation Hide TOC

Malicious or Vulnerable Built-in Device Functionality - T1473 (f9e4f526-ac9d-4df5-8949-833a82a1d2df)

The mobile device could contain built-in functionality with malicious behavior or exploitable vulnerabilities. An adversary could deliberately insert and take advantage of the malicious behavior or could exploit inadvertent vulnerabilities. In many cases, it is difficult to be certain whether exploitable functionality is due to malicious intent or simply an inadvertent mistake.

Platforms: Android, iOS

Cluster A Galaxy A Cluster B Galaxy B Level
Supply Chain Compromise - T1474 (0d95940f-9583-4e0f-824c-a42c1be47fad) Attack Pattern Malicious or Vulnerable Built-in Device Functionality - T1473 (f9e4f526-ac9d-4df5-8949-833a82a1d2df) Attack Pattern 1