Initial Access
MOT1195.301
Sub-technique

Compromise Network Function Supply Chain

Public
4G
5G-SA: Theoretical
Description

Adversaries may compromise the supply chain of virtualized network functions (VNFs) or physical network functions (PNFs) to introduce backdoors or vulnerabilities.

Related Software
Software tools associated with this technique

No related software found

Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Used
5G-SA
Theoretical
5G-NSA
Not Applicable