SP-TE-27: Exploit hardware or platform vulnerabilities
(
)
Trusted applications or services are compromised by underlying platforms through bios exploits, firmware exploits or rootkits
ID
SP-TE-27
Latest Sync Date
11/05/25 14:39:00
Original ID
TE-27
1. API inbound security pattern [Threat Model]
Securitypatterns.io Threat Library
CM-7: Least Functionality
SP-TE-27: Exploit hardware or platform vulnerabilities
SP-TE-27: Exploit hardware or platform vulnerabilities