Tactic: Initial Access
Technique: Supply Chain Compromise
Robots, like other machines with software, make excessive use of dependencies for its functionality. These
dependencies can contain vulnerabilities. An attacker can focus its efforts on exploiting the vulnerable
dependencies. An autonomous robot is not unique in this regard.
Technique in practice
Video: what is a supply chain attack?
Article: what is a supply chain
attack?
Mitigations
The developers of the autonomous robot should keep the used dependencies up-to-date, especially on security-critical
updates. The user of the robot should regularly check for updates from the robot's manufacturer.
Detections
The toolchain used in development should do periodic scanning of its dependencies, and cross-reference these results
with popular security databases. This automated process would notify the developers of vulnerabilities, and what
version to update it to.
Documented incidents with autonomous robots
No incidents known at the time of writing.
Documented incidents in other domains
[2018] Stuxnet
malware (uses a supply chain compromise vulnerability)