ROMMONkit - T1542.004 (a6557c75-798f-42e4-be70-ab4502e0a3bc)
Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary code to provide persistent access and manipulate device behavior that is difficult to detect. (Citation: Cisco Synful Knock Evolution)(Citation: Cisco Blog Legacy Device Attacks)
ROMMON is a Cisco network device firmware that functions as a boot loader, boot image, or boot helper to initialize hardware and software when the platform is powered on or reset. Similar to TFTP Boot, an adversary may upgrade the ROMMON image locally or remotely (for example, through TFTP) with adversary code and restart the device in order to overwrite the existing ROMMON image. This provides adversaries with the means to update the ROMMON to gain persistence on a system in a way that may be difficult to detect.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
ROMMONkit - T1542.004 (a6557c75-798f-42e4-be70-ab4502e0a3bc) | Attack Pattern | Pre-OS Boot - T1542 (7f0ca133-88c4-40c6-a62f-b3083a7fbc2e) | Attack Pattern | 1 |