{"id":3130,"date":"2025-03-18T08:58:59","date_gmt":"2025-03-18T07:58:59","guid":{"rendered":"https:\/\/www.spacesecurity.info\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/"},"modified":"2025-03-18T09:53:39","modified_gmt":"2025-03-18T08:53:39","slug":"an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/","title":{"rendered":"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model"},"content":{"rendered":"<h2>Disclaimer<\/h2>\n<p>Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the satellite.<\/p>\n<p>Both activities are independent of each other and were carried out by different teams. There is no association between me and the team that conducted the hacking experiment.<\/p>\n<p>This work is conducted on a personal basis and is independent of my work at Thales. Thales is in no way involved in this work, and Thales&#8217;s responsibilities cannot be engaged under any circumstances.<\/p>\n<p>All slides embedded in this article are public slides presented by Thales during the CYSAT 2023 conference and available in the Youtube video which presents the Thales experiment.<\/p>\n<h2>Purpose of the article<\/h2>\n<p>In this article, I show how I used the <a href=\"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\">MITRE EMB3D\u2122 Threat Model<\/a> to break down the experiment of Thales satellite hacking demo at CYSAT 2023, identify key lessons learned, and record possible countermeasures.<\/p>\n<p><strong>Brandon Bailey<\/strong> and <strong>Brad Roeher<\/strong> from the SPARTA team already did an analysis of the Thales satellite hacking demo (<a href=\"https:\/\/www.spacesecurity.info\/an-analysis-of-the-thales-satellite-hacking-demo-cysat-2023-by-sparta-team\/\">summarized in this article<\/a>, full article <a href=\"https:\/\/medium.com\/the-aerospace-corporation\/hacking-an-on-orbit-satellite-an-analysis-of-the-cysat-2023-demo-ae241e5b8ee5\">here<\/a>) but with the <a href=\"https:\/\/www.spacesecurity.info\/aerospace-corporation-released-sparta-v1-3-a-new-version-of-the-space-attack-research-and-tactic-analysis-sparta-matrix\/\">SPARTA framework<\/a>. You can enter to the SPARTA portal\u00a0<a href=\"https:\/\/aerospace.org\/article\/understanding-space-cyber-threats-sparta-matrix\">here<\/a>.<\/p>\n<p>The goal with this article is to go further by using the <a href=\"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\">MITRE EMB3D\u2122<\/a>, a Threat Model for embedded systems, to identify threats and possible associated countermeasures.<\/p>\n<h2>Important Note<\/h2>\n<p>Before we dive in, I want to clarify an important distinction between threats and vulnerabilities.<\/p>\n<p>Threat modeling tools focus on identifying threats, which are potential risks that could be exploited by an attacker. Vulnerabilities, on the other hand, are specific weaknesses in a system that can be exploited.<\/p>\n<p>In this analysis, it turns out that the threats identified by the threat model were actual vulnerabilities, as they could be exploited by the team.<\/p>\n<h2>Hacking demo at CYSAT 2023: what was the point again<\/h2>\n<p>For the third edition of CYSAT, the European event entirely dedicated to cybersecurity for the space industry, taking place on 26-27 April 2023 at Station F in Paris, the European Space Agency (ESA) set up a satellite test bench to simulate attempts to seize control of OPS-SAT, a nanosatellite operated by the agency for demonstration purposes.<\/p>\n<p>Thales\u2019s offensive cybersecurity team stepped up to the challenge, identifying vulnerabilities that could enable malicious actors to disrupt operation of the ESA satellite.<\/p>\n<figure id=\"attachment_3111\" aria-describedby=\"caption-attachment-3111\" style=\"width: 956px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Thales-OPS-SAT-context.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3111 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Thales-OPS-SAT-context.jpg\" alt=\"\" width=\"956\" height=\"536\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Thales-OPS-SAT-context.jpg 956w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Thales-OPS-SAT-context-300x168.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Thales-OPS-SAT-context-768x431.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Thales-OPS-SAT-context-696x390.jpg 696w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/a><figcaption id=\"caption-attachment-3111\" class=\"wp-caption-text\">Figure 1: Thales Cyber Security Experiment Context (Slide courtesy The European Space Agency).<\/figcaption><\/figure>\n<p>The results of the ethical satellite hacking exercise, the first of its kind in the world, will be used to tighten security for the satellite and its onboard applications, helping to improve the cyber resilience of space systems, protect sensitive data and support the long-term success of space programs.<\/p>\n<h2>To know more about the Thales Demo in video<\/h2>\n<div class=\"youtube-embed\" data-video_id=\"sXGQWLJ8904\"><iframe loading=\"lazy\" title=\"Hack CYSAT 2023 - World premiere: hacking and recovery of a flying satellite\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/sXGQWLJ8904?feature=oembed&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<h2>What is OPS-SAT<\/h2>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/OPS-SAT\">OPS-SAT<\/a> is a small, CubeSat-class satellite developed by the European Space Agency (ESA) to serve as a testbed for innovative software, systems, and operational concepts in space.<\/p>\n<p>From a cybersecurity perspective, OPS-SAT represents a critical platform for experimenting with and addressing the unique challenges of securing space-based assets.<\/p>\n<figure id=\"attachment_3109\" aria-describedby=\"caption-attachment-3109\" style=\"width: 960px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/OPS-SAT-Lab.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3109 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/OPS-SAT-Lab.jpg\" alt=\"\" width=\"960\" height=\"542\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/OPS-SAT-Lab.jpg 960w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/OPS-SAT-Lab-300x169.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/OPS-SAT-Lab-768x434.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/OPS-SAT-Lab-696x393.jpg 696w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><figcaption id=\"caption-attachment-3109\" class=\"wp-caption-text\">Figure 2: What is the OPS-SAT Space Lab? (Slide courtesy The European Space Agency).<\/figcaption><\/figure>\n<h2>What is MITRE EMB3D\u2122 Threat Model<\/h2>\n<p>EMB3D\u2122 is a Cybersecurity Threat Model released by MITRE in May 2024 and dedicated for Embedded Devices.<\/p>\n<p>EMB3D is aligned with and expands on several existing models, including\u00a0<a href=\"https:\/\/cwe.mitre.org\/\">Common Weakness Enumeration<\/a>,\u00a0<a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK\u00ae<\/a>, and\u00a0<a href=\"https:\/\/cve.mitre.org\/\">Common Vulnerabilities and Exposures<\/a>, but with a specific embedded-device focus. The threats defined within EMB3D are based on observation of use by threat actors, proof-of-concept and theoretical\/conceptual security research publications, and device vulnerability and weakness reports. These threats are mapped to device properties to help users develop and tailor accurate threat models for specific embedded devices.<\/p>\n<figure id=\"attachment_2859\" aria-describedby=\"caption-attachment-2859\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2859 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png\" alt=\"\" width=\"696\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-300x129.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-768x331.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1536x663.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-2048x883.png 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-696x300.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1068x461.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1920x828.png 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-2859\" class=\"wp-caption-text\">Figure 3: The MITRE EMB3D\u2122 Threat Model (figure courtesy The MITRE Corporation).<\/figcaption><\/figure>\n<p>Each threat description include a set of Foundational, Intermediate, and Leading mitigations. These mitigations will provide guidance on what technical mechanisms can best prevent or reduce the risk of that threat.<\/p>\n<p>For each threat, EMB3D will suggest technical mechanisms that vendors should build into the device to mitigate the given threat. EMB3D is a comprehensive framework for the entire security ecosystem\u2014device vendors, asset owners, security researchers, and testing organizations.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2857\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1024x443.png\" alt=\"\" width=\"696\" height=\"301\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1024x443.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-300x130.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-768x332.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1536x664.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-696x301.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D-1068x462.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/EMB3D.png 1744w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>To know more about the MITRE EMB3D\u2122 Cybersecurity Threat Model for Embedded Devices, check our article\u00a0<a href=\"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\">here<\/a>.<\/p>\n<h2>Analysis of the Thales OPS-SAT hacking Attack Chain<\/h2>\n<p>The figure below is showing a summary of the full attack flow used by the Thales team to conduct the attack on OPS-SAT.<\/p>\n<figure id=\"attachment_3113\" aria-describedby=\"caption-attachment-3113\" style=\"width: 940px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3113 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg\" alt=\"\" width=\"940\" height=\"538\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg 940w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow-300x172.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow-768x440.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow-696x398.jpg 696w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><figcaption id=\"caption-attachment-3113\" class=\"wp-caption-text\">Figure 4: Summary of the full attack flow (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p><strong>Step 1: Unsafe Java deserialization<\/strong><\/p>\n<p>To introduce the compromised or flawed software onto the spacecraft, the team needed to bypass security checks and evaluations. To achieve their objective, they introduced a deserialization vulnerability into the software, enabling defensive mechanism evasion and potential exploitation for executing arbitrary commands.<\/p>\n<figure id=\"attachment_3094\" aria-describedby=\"caption-attachment-3094\" style=\"width: 926px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Deserialization.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3094 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Deserialization.jpg\" alt=\"\" width=\"926\" height=\"524\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Deserialization.jpg 926w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Deserialization-300x170.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Deserialization-768x435.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Deserialization-696x394.jpg 696w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/a><figcaption id=\"caption-attachment-3094\" class=\"wp-caption-text\">Figure 5: The Deserialization Vulnerability (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p>The insecure deserialization threat is documented in the EMB3D Threat Model with the following Threat ID (TID) and Properties ID (PID):<\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr>\n<td style=\"width: 50%;\"><strong>Threat ID<\/strong><\/td>\n<td style=\"width: 50%;\"><strong>Properties ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 50%;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-326.html\">TID-326<\/a>: Insecure Deserialization<\/td>\n<td style=\"width: 50%;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-3121\">PID-3121<\/a>: Device includes support for object oriented programming languages(e.g., Java, Python, PHP, C++)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6 style=\"text-align: left;\"><em>Table 1: Identified threats for the step 1 (Unsafe Java deserialization)<\/em><\/h6>\n<figure id=\"attachment_3098\" aria-describedby=\"caption-attachment-3098\" style=\"width: 926px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Stay-Undetected-Success.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3098 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Stay-Undetected-Success.jpg\" alt=\"\" width=\"926\" height=\"526\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Stay-Undetected-Success.jpg 926w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Stay-Undetected-Success-300x170.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Stay-Undetected-Success-768x436.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Stay-Undetected-Success-696x395.jpg 696w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/a><figcaption id=\"caption-attachment-3098\" class=\"wp-caption-text\">Figure 6: Stay Undetected &#8211; Success! (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p><strong>Step 2: Applications Binaries Modified<\/strong><\/p>\n<p>Once the insecure deserialization achieved, the team uploaded a malicious code with the deserialization vulnerability to modify the application-level binaries on the remote device to introduce unauthorized code and to execute arbitrary commands on the remote system.<\/p>\n<figure id=\"attachment_3096\" aria-describedby=\"caption-attachment-3096\" style=\"width: 932px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Applications-Binaries-Modified.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3096 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Applications-Binaries-Modified.jpg\" alt=\"\" width=\"932\" height=\"526\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Applications-Binaries-Modified.jpg 932w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Applications-Binaries-Modified-300x169.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Applications-Binaries-Modified-768x433.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Applications-Binaries-Modified-696x393.jpg 696w\" sizes=\"auto, (max-width: 932px) 100vw, 932px\" \/><\/a><figcaption id=\"caption-attachment-3096\" class=\"wp-caption-text\">Figure 7: Stay Undetected &#8211; Execute Arbitrary Commands (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p>The ability to modify application-level binaries and to install Untrusted Application on a remote system is documented in the EMB3D Threat Model with the following threats ID and properties ID:<\/p>\n<table style=\"height: 312px; width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Threat ID<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Properties ID<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-301.html\">TID-301<\/a>: Applications Binaries Modified<\/td>\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-31\">PID-31<\/a>: Application-level software is present and running on the device<\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 50%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-302.html\">TID-302<\/a>: Install Untrusted Application<\/td>\n<td style=\"width: 50%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-32\">PID-32<\/a>: Device includes the ability to deploy custom or external programs (e.g., ladder logic, compiled binaries)<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-307.html\">TID-307<\/a>: Device Code Representations Inconsistent<\/td>\n<td style=\"width: 50%; height: 156px;\" rowspan=\"3\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-324\">PID-324<\/a>: Device includes support for &#8220;program uploads&#8221; to retrieve programs from the device from an engineering workstation<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-308.html\">TID-308<\/a>: Code Overwritten to Avoid Detection<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-309.html\">TID-309<\/a>: Device Exploits Engineering Workstation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><em>Table 2: Identified threats for the step 2 (Applications Binaries Modified)<\/em><\/h6>\n<p><strong>Step 3: Privilege escalation via the CAN bus<\/strong><\/p>\n<p>At this stage, their app runs as an unprivileged Linux user and has no direct access to sensors but though the supervisor. Their objective is now to find system configuration issues or vulnerabilities to realize a privilege escalation from user to root.<\/p>\n<p>They identified that anyone can talk on the CAN bus, including unprivileged apps. And then, all commands send on the CAN bus are executing as root by a client that runs as root and that decodes and executes as root whatever command it receives.<\/p>\n<figure id=\"attachment_3100\" aria-describedby=\"caption-attachment-3100\" style=\"width: 940px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Privilege-Escalation.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3100 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Privilege-Escalation.jpg\" alt=\"\" width=\"940\" height=\"532\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Privilege-Escalation.jpg 940w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Privilege-Escalation-300x170.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Privilege-Escalation-768x435.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Privilege-Escalation-696x394.jpg 696w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><figcaption id=\"caption-attachment-3100\" class=\"wp-caption-text\">Figure 8: Taking Control &#8211; Privilege Escalation from User to Root (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p>The ability to privilege escalation is documented in the EMB3D Threat Model with the following threats ID and properties ID:<\/p>\n<table style=\"height: 260px; width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Threat ID<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Properties ID<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-114.html\">TID-114<\/a>: Peripheral Data Bus Interception<strong><br \/>\n<\/strong><\/td>\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-13\">PID-13<\/a>: Device includes peripheral chips and integrated data buses<strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 50%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-412.html\">TID-412<\/a>: Network Routing Capability Abuse<\/td>\n<td style=\"width: 50%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-42\">PID-42<\/a>: Device includes procedure to forward or route network messages<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-204.html\">TID-204<\/a>: Untrusted Programs Can Access Privileged OS Functions<\/td>\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-2321\">PID-2321<\/a>: Device lacks an access enforcement\/privilege mechanism<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-219.html\">TID-219<\/a>: OS\/Kernel Privilege Escalation<\/td>\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-23221\">PID-23221<\/a>: Device includes and enforces OS user accounts<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><em>Table 3: Identified threats for the step 3 (Privilege escalation via the CAN Bus)<\/em><\/h6>\n<figure id=\"attachment_3102\" aria-describedby=\"caption-attachment-3102\" style=\"width: 942px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Arbitrary-Code-Execution.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3102 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Arbitrary-Code-Execution.jpg\" alt=\"\" width=\"942\" height=\"540\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Arbitrary-Code-Execution.jpg 942w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Arbitrary-Code-Execution-300x172.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Arbitrary-Code-Execution-768x440.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Arbitrary-Code-Execution-696x399.jpg 696w\" sizes=\"auto, (max-width: 942px) 100vw, 942px\" \/><\/a><figcaption id=\"caption-attachment-3102\" class=\"wp-caption-text\">Figure 9: Taking Control &#8211; Arbitrary Code Execution as Root (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p><strong>Step 4: Persistence<\/strong><\/p>\n<p>At this stage, the app escalated as root. Now, the team needed to ensure persistent effects on sensors. They identified a jar library on the Supervisor that is writable by root user. A jar is simply a zip file, with compiled Java bytecode inside. The team crafted a bytecode based on the original one, and simply replace some files inside the jar. The supervisor now runs the jar containing the malicious bytecode.<\/p>\n<figure id=\"attachment_3104\" aria-describedby=\"caption-attachment-3104\" style=\"width: 934px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Persistance.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3104 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Persistance.jpg\" alt=\"\" width=\"934\" height=\"534\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Persistance.jpg 934w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Persistance-300x172.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Persistance-768x439.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Persistance-696x398.jpg 696w\" sizes=\"auto, (max-width: 934px) 100vw, 934px\" \/><\/a><figcaption id=\"caption-attachment-3104\" class=\"wp-caption-text\">Figure 10: Persistence &#8211; Injection of a Jar Library (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p>The ability to manipulate Runtime Environment, to modify System Component and modify native library of the operating system are documented in the EMB3D Threat Model with the following threats ID and properties ID:<\/p>\n<table style=\"height: 364px; width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><strong>Threat ID<\/strong><\/td>\n<td style=\"width: 50%; height: 26px;\"><strong>Properties ID<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 50%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-304\">TID-304<\/a>: Manipulate Runtime Environment<\/td>\n<td style=\"width: 50%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-322\">PID-322<\/a>: Device includes a program runtime environment for custom or external programs<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 50%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-305.html\">TID-305<\/a>: Program Executes Dangerous System Calls<\/td>\n<td style=\"width: 50%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-3231\">PID-3231<\/a>: Device includes ability to run custom\/external programs as native binary without a confined\/restricted environment<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-203.html\">TID-203<\/a>: Malicious OS Kernel Driver\/Module Installable<\/td>\n<td style=\"width: 50%; height: 26px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-231\">PID-231<\/a>: Device includes an operating system that uses drivers\/modules that can be loaded<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 50%; height: 26px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-202.html\">TID-202<\/a>: Exploitable System Network Stack Component<\/td>\n<td style=\"width: 50%; height: 26px;\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-23\">PID-23<\/a>: Device includes OS\/kernel<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-307.html\">TID-307<\/a>: Device Code Representations Inconsistent<\/td>\n<td style=\"width: 50%; height: 104px;\" rowspan=\"2\"><a href=\"https:\/\/emb3d.mitre.org\/properties-mapper\/?id=PID-324\">PID-324<\/a>: Device includes support for &#8220;program uploads&#8221; to retrieve programs from the device from an engineering workstation<\/td>\n<\/tr>\n<tr style=\"height: 52px;\">\n<td style=\"width: 50%; height: 52px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-308.html\">TID-308<\/a>: Code Overwritten to Avoid Detection<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><em>Table 4: Identified threats for the step 4 (Persistence)<\/em><\/h6>\n<p><strong>Step 5: OPS-SAT attack by tampering with camera and ADCS<\/strong><\/p>\n<p>Once the team escalated as root and ensured persistency, they took control on the supervisor and the demo effects was achieved.<\/p>\n<figure id=\"attachment_3106\" aria-describedby=\"caption-attachment-3106\" style=\"width: 930px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Demo-Effects.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3106 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Demo-Effects.jpg\" alt=\"\" width=\"930\" height=\"526\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Demo-Effects.jpg 930w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Demo-Effects-300x170.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Demo-Effects-768x434.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/THALES-OPS-SAT-Demo-Effects-696x394.jpg 696w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/a><figcaption id=\"caption-attachment-3106\" class=\"wp-caption-text\">Figure 11: Demo Effects &#8211; Tampering with Camera &amp; ADCS (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<ul>\n<li>They could alter\/delete all images captured by the camera<\/li>\n<li>They could override satellite attitude requested by other apps<\/li>\n<li>This also provides persistence for the malicious code since the supervisor starts early and is almost always running<\/li>\n<\/ul>\n<figure id=\"attachment_3116\" aria-describedby=\"caption-attachment-3116\" style=\"width: 954px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Others-Potential-Effects.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3116 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Others-Potential-Effects.jpg\" alt=\"\" width=\"954\" height=\"542\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Others-Potential-Effects.jpg 954w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Others-Potential-Effects-300x170.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Others-Potential-Effects-768x436.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Others-Potential-Effects-696x395.jpg 696w\" sizes=\"auto, (max-width: 954px) 100vw, 954px\" \/><\/a><figcaption id=\"caption-attachment-3116\" class=\"wp-caption-text\">Figure 12: Other Potential Effects (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<h2>Threat Heat Map<\/h2>\n<p>Using the EMB3D Threat Mapper feature, we create the following Threat Heat Map which represents all the threats affecting the system.<\/p>\n<p>With the EMB3D Threat model, we identified\u00a0 14 cyber threats. The data is shown into an Excel sheet.<\/p>\n<figure id=\"attachment_3086\" aria-describedby=\"caption-attachment-3086\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3086 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat-1024x422.jpg\" alt=\"\" width=\"696\" height=\"287\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat-1024x422.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat-300x124.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat-768x316.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat-1536x633.jpg 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat-696x287.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat-1068x440.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/emb3d-ops-sat.jpg 1677w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-3086\" class=\"wp-caption-text\">Table 5: Threat Heat Map of the OPS-SAT system<\/figcaption><\/figure>\n<h2>Cyber risk mitigation for satellite system<\/h2>\n<p>The figure below shows the high-level countermeasures guidance provided by Thales.<\/p>\n<figure id=\"attachment_3127\" aria-describedby=\"caption-attachment-3127\" style=\"width: 940px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Mitigation-Risk-Prevention.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3127 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Mitigation-Risk-Prevention.jpg\" alt=\"\" width=\"940\" height=\"534\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Mitigation-Risk-Prevention.jpg 940w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Mitigation-Risk-Prevention-300x170.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Mitigation-Risk-Prevention-768x436.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Mitigation-Risk-Prevention-696x395.jpg 696w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><figcaption id=\"caption-attachment-3127\" class=\"wp-caption-text\">Figure 13: Mitigation Risk &#8211; Prevention (Slide courtesy Thales Group)<\/figcaption><\/figure>\n<p>The figure below shows the result of the analysis conducted by Brandon Bailey &amp; Brad Roeher of the Thales experiment with the SPARTA framework (you can enter to the SPARTA portal\u00a0<a href=\"https:\/\/aerospace.org\/article\/understanding-space-cyber-threats-sparta-matrix\">here<\/a>). In this figure, they are showing the full attack chain overlaid with SPARTA TTPs and associated countermeasures (full article of their analysis <a href=\"https:\/\/medium.com\/the-aerospace-corporation\/hacking-an-on-orbit-satellite-an-analysis-of-the-cysat-2023-demo-ae241e5b8ee5\">here<\/a>).<\/p>\n<figure id=\"attachment_2227\" aria-describedby=\"caption-attachment-2227\" style=\"width: 696px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Summary-of-Thales-Full-Attack-Flow.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2227 size-large\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Summary-of-Thales-Full-Attack-Flow-1024x531.jpg\" alt=\"\" width=\"696\" height=\"361\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Summary-of-Thales-Full-Attack-Flow-1024x531.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Summary-of-Thales-Full-Attack-Flow-300x156.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Summary-of-Thales-Full-Attack-Flow-768x398.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Summary-of-Thales-Full-Attack-Flow-696x361.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2023\/05\/Summary-of-Thales-Full-Attack-Flow.jpg 1026w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><figcaption id=\"caption-attachment-2227\" class=\"wp-caption-text\">Figure 14: The full attack chain overlaid with SPARTA TTPs and associated countermeasures. (Slide courtesy Thales Group and SPARTA Team)<\/figcaption><\/figure>\n<p>In the rest of this article, I propose to identify a list of associated mitigations proposed by EMB3D Threat Model.<\/p>\n<p>&nbsp;<\/p>\n<h2>About Associated Mitigations in\u00a0 the EMB3D Threat Model<\/h2>\n<p>In light of the various threats we have identified, we outline below a list of associated mitigations proposed by EMB3D Threat Model.<\/p>\n<p><strong>Mitigation tiers<\/strong><\/p>\n<p>These mitigations have varying efficiencies and challenges with their implementations.<\/p>\n<p>Mitigation tiers (foundational\/intermediate\/leading) are intended to help better understand how to assess the challenge of deploying mitigations and better strategize and prioritize efforts to add additional mitigations or technologies to address threats.<\/p>\n<figure id=\"attachment_2969\" aria-describedby=\"caption-attachment-2969\" style=\"width: 804px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2969 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations.jpg\" alt=\"\" width=\"804\" height=\"445\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations.jpg 804w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations-300x166.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations-768x425.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/Assoxciated-mitigations-696x385.jpg 696w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/a><figcaption id=\"caption-attachment-2969\" class=\"wp-caption-text\">Table 6: List of Mitigation Tiers in the MITRE EMB3D threat model<\/figcaption><\/figure>\n<p><strong>ISA\/IEC 62443-4-2 Mappings<\/strong><\/p>\n<p>ISA is the International Society of Automation. ISA\/IEC 62443 is the applicable standard for cybersecurity of OT and ICS (IACS).\u00a0Each associated mitigation is mapped with the ISA\/IEC 62443-4-2.<\/p>\n<h2>List of Associated Mitigations for the OPS-SAT<\/h2>\n<p><strong>Step 1: Unsafe Java deserialization<\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr style=\"height: 52px;\">\n<td style=\"width: 27.2988%; height: 52px;\"><strong>Threats<\/strong><\/td>\n<td style=\"width: 21.5518%; height: 52px;\"><strong>Associated Mitigations<\/strong><\/td>\n<td style=\"width: 16.5229%; height: 52px;\"><strong>Level<\/strong><\/td>\n<td style=\"width: 34.6265%;\"><strong>IEC 62443 4-2 Mappings<br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 27.2988%;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-326.html\">TID-326<\/a> &#8211; Insecure Deserialization<strong><br \/>\n<\/strong><\/td>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-077.html\">MID-077<\/a>\u00a0&#8211; Secure Deserialization<\/td>\n<td style=\"width: 16.5229%;\">Foundational<\/td>\n<td style=\"width: 34.6265%;\">\n<ul>\n<li>CR 3.5 &#8211; Input validation<\/li>\n<li>SAR \/ EDR \/ HDR \/ NDR 3.2 \u2013 Protection from malicious code<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><em>Table 7: Identified mitigations for the step 1 (Unsafe Java deserialization)<\/em><\/h6>\n<p><strong>Step 2: Applications Binaries Modified<\/strong><\/p>\n<table style=\"width: 100%; border-collapse: collapse; border-style: solid;\">\n<tbody>\n<tr style=\"height: 52px;\">\n<td style=\"width: 27.2988%; height: 52px;\"><strong>Threats<\/strong><\/td>\n<td style=\"width: 21.5518%; height: 52px;\"><strong>Associated Mitigations<\/strong><\/td>\n<td style=\"width: 17.0976%; height: 52px;\"><strong>Level<\/strong><\/td>\n<td style=\"width: 34.0518%;\"><strong>IEC 62443 4-2 Mappings<br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 27.2988%;\" rowspan=\"2\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-301.html\">TID-301<\/a> &#8211; Applications Binaries Modified<\/td>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/td>\n<td style=\"width: 17.0976%;\">Intermediate<\/td>\n<td style=\"width: 34.0518%;\" rowspan=\"2\">\n<ul>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-003.html\">MID-003<\/a>\u00a0&#8211; Periodic\/Continuous Integrity Measurement and Remote Attestation<\/td>\n<td style=\"width: 17.0976%;\">Leading<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 27.2988%;\" rowspan=\"5\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-302.html\">TID-302<\/a> &#8211; Install Untrusted Application<\/td>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-041.html\">MID-041<\/a>\u00a0&#8211; Cryptographically Signed Vendor-supplied Programs<\/td>\n<td style=\"width: 17.0976%;\">Foundational<\/td>\n<td style=\"width: 34.0518%;\">\n<ul>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-051.html\">MID-051<\/a>\u00a0&#8211; Disallow User-Provided Code<\/td>\n<td style=\"width: 17.0976%;\">Foundational<\/td>\n<td style=\"width: 34.0518%;\" rowspan=\"2\">\n<ul>\n<li>SAR \/ EDR \/ HDR \/ NDR 3.2 &#8211; Protection for malicious code<\/li>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-040.html\">MID-040<\/a>\u00a0&#8211; Cryptographically Signed Custom Programs<\/td>\n<td style=\"width: 17.0976%;\">Intermediate<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/td>\n<td style=\"width: 17.0976%;\">Intermediate<\/td>\n<td style=\"width: 34.0518%;\" rowspan=\"2\">\n<ul>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-003.html\">MID-003<\/a>\u00a0&#8211; Periodic\/Continuous Integrity Measurement and Remote Attestation<\/td>\n<td style=\"width: 17.0976%;\">Leading<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 27.2988%;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-307.html\">TID-307<\/a> &#8211; Device Code Representations Inconsistent<\/td>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-042.html\">MID-042<\/a>\u00a0&#8211; Device Checks Consistency Between Binary\/Running Code and Textual Code<\/td>\n<td style=\"width: 17.0976%;\">Foundational<\/td>\n<td style=\"width: 34.0518%;\">\n<ul>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 27.2988%;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-308.html\">TID-308<\/a> &#8211; Code Overwritten to Avoid Detection<\/td>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-017.html\">MID-017<\/a>\u00a0&#8211; Security-relevant Auditing and Logging<\/td>\n<td style=\"width: 17.0976%;\">Foundational<\/td>\n<td style=\"width: 34.0518%;\">\n<ul>\n<li>CR 2.8 &#8211; Auditable events<\/li>\n<li>CR 3.7 \u2013 Error handling<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 27.2988%;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-309.html\">TID-309<\/a> &#8211; Device Exploits Engineering Workstation<\/td>\n<td style=\"width: 21.5518%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-008.html\">MID-008<\/a>\u00a0&#8211; Decidable Protocols and Parsers<\/td>\n<td style=\"width: 17.0976%;\">Intermediate<\/td>\n<td style=\"width: 34.0518%;\">\n<ul>\n<li>none<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><em>Table 8: Identified mitigations for the step 2 (Applications Binaries Modified)<\/em><\/h6>\n<p><strong>Step 3: Privilege escalation via the CAN bus<\/strong><\/p>\n<table style=\"border-collapse: collapse; border-style: solid; width: 696px;\">\n<tbody>\n<tr style=\"height: 52px;\">\n<td style=\"width: 190px; height: 52px;\"><strong>Threats<\/strong><\/td>\n<td style=\"width: 150.001px; height: 52px;\"><strong>Associated Mitigations<\/strong><\/td>\n<td style=\"width: 118.999px; height: 52px;\"><strong>Level<\/strong><\/td>\n<td style=\"width: 237.001px;\"><strong>IEC 62443 4-2 Mappings<br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 190px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-114.html\">TID-114<\/a> &#8211; Peripheral Data Bus Interception<strong><br \/>\n<\/strong><\/td>\n<td style=\"width: 150.001px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-068.html\">MID-068<\/a>\u00a0&#8211; Data Bus Encryption and Message Authentication<\/td>\n<td style=\"width: 118.999px;\">Intermediate<\/td>\n<td style=\"width: 237.001px;\">\n<ul>\n<li>CR 3.1 \u2013 Communication integrity &#8211; RE (1) Communication authentication<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 190px;\" rowspan=\"3\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-412.html\">TID-412<\/a> &#8211; Network Routing Capability Abuse<\/td>\n<td style=\"width: 150.001px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-017.html\">MID-017<\/a>\u00a0&#8211; Security-relevant Auditing and Logging<\/td>\n<td style=\"width: 118.999px;\">Foundational<\/td>\n<td style=\"width: 237.001px;\">\n<ul>\n<li>CR 2.8 &#8211; Auditable events<\/li>\n<li>CR 3.7 \u2013 Error handling<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 150.001px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-038.html\">MID-038<\/a>\u00a0&#8211; Authenticate for Administrative Actions<\/td>\n<td style=\"width: 118.999px;\">Foundational<\/td>\n<td style=\"width: 237.001px;\">\n<ul>\n<li>CR 2.1 &#8211; Authorization Enforcement<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 150.001px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-083.html\">MID-083<\/a>\u00a0&#8211; Network Firewall\/Access Control List<\/td>\n<td style=\"width: 118.999px;\">Foundational<\/td>\n<td style=\"width: 237.001px;\">\n<ul>\n<li>CR 5.1 \u2013 Network segmentation<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 190px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-204.html\">TID-204<\/a> &#8211; Untrusted Programs Can Access Privileged OS Functions<\/td>\n<td style=\"width: 150.001px;\" rowspan=\"2\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-012.html\">MID-012<\/a>\u00a0&#8211; OS-based Access Control Mechanisms<\/td>\n<td style=\"width: 118.999px;\" rowspan=\"2\">Foundational<\/td>\n<td style=\"width: 237.001px;\" rowspan=\"2\">\n<ul>\n<li>CR 2.1 &#8211; Authorization Enforcement<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 190px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-219.html\">TID-219<\/a> &#8211; OS\/Kernel Privilege Escalation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><em>Table 9: Identified mitigations for the step 3 (Privilege escalation via the CAN bus)<\/em><\/h6>\n<p><strong>Step 4: Persistence<\/strong><\/p>\n<table style=\"border-collapse: collapse; border-style: solid; width: 100.143%; height: 1151px;\">\n<tbody>\n<tr style=\"height: 52px;\">\n<td style=\"width: 24.8207%; height: 52px;\"><strong>Threats<\/strong><\/td>\n<td style=\"width: 23.9598%; height: 52px;\"><strong>Associated Mitigations<\/strong><\/td>\n<td style=\"width: 17.0732%; height: 52px;\"><strong>Level<\/strong><\/td>\n<td style=\"width: 34.0029%; height: 52px;\"><strong>IEC 62443 4-2 Mappings<br \/>\n<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 119px;\">\n<td style=\"width: 24.8207%; height: 404px;\" rowspan=\"3\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-304\">TID-304<\/a> &#8211; Manipulate Runtime Environment<\/td>\n<td style=\"width: 23.9598%; height: 119px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-013.html\">MID-013<\/a>\u00a0&#8211; Process and Thread Memory Segmentation<\/td>\n<td style=\"width: 17.0732%; height: 119px;\">Foundational<\/td>\n<td style=\"width: 34.0029%; height: 119px;\">\n<ul>\n<li>SAR \/ EDR \/ HDR \/ NDR 3.2 \u2013 Protection from malicious code<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 23.9598%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/td>\n<td style=\"width: 17.0732%; height: 104px;\">Intermediate<\/td>\n<td style=\"width: 34.0029%; height: 104px;\">\n<ul>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 181px;\">\n<td style=\"width: 23.9598%; height: 181px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-015.html\">MID-015<\/a>\u00a0&#8211; Containerization<\/td>\n<td style=\"width: 17.0732%; height: 181px;\">Intermediate<\/td>\n<td style=\"width: 34.0029%; height: 181px;\">\n<ul>\n<li>SAR \/ EDR \/ HDR \/ NDR 3.2 \u2013 Protection from malicious code<\/li>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 181px;\">\n<td style=\"width: 24.8207%; height: 181px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-305.html\">TID-305<\/a> &#8211; Program Executes Dangerous System Calls<\/td>\n<td style=\"width: 23.9598%; height: 181px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-015.html\">MID-015<\/a>\u00a0&#8211; Containerization<\/td>\n<td style=\"width: 17.0732%; height: 181px;\">Intermediate<\/td>\n<td style=\"width: 34.0029%; height: 181px;\">\n<ul>\n<li>SAR \/ EDR \/ HDR \/ NDR 3.2 \u2013 Protection from malicious code<\/li>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 104px;\">\n<td style=\"width: 24.8207%; height: 234px;\" rowspan=\"2\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-203.html\">TID-203<\/a> &#8211; Malicious OS Kernel Driver\/Module Installable<\/td>\n<td style=\"width: 23.9598%; height: 104px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-009.html\">MID-009<\/a>\u00a0&#8211; Operating System-based Runtime Integrity Check<\/td>\n<td style=\"width: 17.0732%; height: 104px;\">Intermediate<\/td>\n<td style=\"width: 34.0029%; height: 234px;\" rowspan=\"2\">\n<ul>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 130px;\">\n<td style=\"width: 23.9598%; height: 130px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-003.html\">MID-003<\/a>\u00a0&#8211; Periodic\/Continuous Integrity Measurement and Remote Attestation<\/td>\n<td style=\"width: 17.0732%; height: 130px;\">Leading<\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 24.8207%; height: 78px;\" rowspan=\"2\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-202.html\">TID-202<\/a> &#8211; Exploitable System Network Stack Component<\/td>\n<td style=\"width: 23.9598%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-007.html\">MID-007<\/a>\u00a0&#8211; Control Flow Manipulation Protections<\/td>\n<td style=\"width: 17.0732%; height: 78px;\">Intermediate<\/td>\n<td style=\"width: 34.0029%; height: 78px;\">\n<ul>\n<li>SAR \/ EDR \/ HDR \/ NDR 3.2 \u2013 Protection from malicious code<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 26px;\">\n<td style=\"width: 23.9598%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-008.html\">MID-008<\/a>\u00a0&#8211; Decidable Protocols and Parsers<\/td>\n<td style=\"width: 17.0732%;\">Intermediate<\/td>\n<td style=\"width: 34.0029%;\">\n<ul>\n<li>none<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr style=\"height: 78px;\">\n<td style=\"width: 24.8207%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-307.html\">TID-307<\/a> &#8211; Device Code Representations Inconsistent<\/td>\n<td style=\"width: 23.9598%; height: 78px;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-042.html\">MID-042<\/a>\u00a0&#8211; Device Checks Consistency Between Binary\/Running Code and Textual Code<\/td>\n<td style=\"width: 17.0732%; height: 78px;\">Foundational<\/td>\n<td style=\"width: 34.0029%; height: 78px;\">\n<ul>\n<li>CR 3.4 \u2013 Software and information integrity<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 24.8207%;\"><a href=\"https:\/\/emb3d.mitre.org\/threats\/TID-308.html\">TID-308<\/a> &#8211; Code Overwritten to Avoid Detection<\/td>\n<td style=\"width: 23.9598%;\"><a href=\"https:\/\/emb3d.mitre.org\/mitigations\/MID-017.html\">MID-017<\/a>\u00a0&#8211; Security-relevant Auditing and Logging<\/td>\n<td style=\"width: 17.0732%;\">Foundational<\/td>\n<td style=\"width: 34.0029%;\">\n<ul>\n<li>CR 2.8 &#8211; Auditable events<\/li>\n<li>CR 3.7 \u2013 Error handling<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6><em>Table 10: Identified mitigations for the step 4 (Persistence)<\/em><\/h6>\n<h2>The Advantages of the EMB3D Threat Model for a Satellite System<\/h2>\n<p>The EMB3D threat model enables the prioritization of mitigations through categorization into levels (fundamental, intermediate, advanced). This allows for a gradual implementation.<\/p>\n<p>The EMB3D threat model is aligned with standards. The mitigations are mapped to the security controls specified in the ISA\/IEC 62443-4-2 standard for industrial control systems.<\/p>\n<p>The EMB3D threat model is complementary to the SPARTA framework. It helps propose additional mitigations, allowing to create a consolidated list of security measures.<\/p>\n<h2>Next steps to go further<\/h2>\n<p>After identifying the mitigations and countermeasures proposed by the EMB3D threat model, here are the next steps you can take.<\/p>\n<p>The next step in the study will be to verify if the countermeasures proposed by the EMB3D threat model can be embedded on the OPS-SAT system and can effectively prevent all the actions carried out by the team.<\/p>\n<p>The next step can be also to develop an implementation plan and a roadmap to implement the selected mitigations, considering technical and operational constraints.<\/p>\n<p>We could also do a comparative analysis by comparing the mitigations proposed by the EMB3D threat model and the SPARTA framework to check their relevance and to identify overlaps and differences. This will allow to create a consolidated list of security measures.<\/p>\n<h2>Acknowledgments<\/h2>\n<p>Many thanks to ESA, to the CYSAT conference and to the Thales team for making this experiment possible, and for making it so enriching for the community.<\/p>\n<p>A big thank you also to the SPARTA team, who inspired this article and contribute to strengthening the cybersecurity of satellites and space systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the satellite. Both activities are independent of each other and were carried out by different teams. There is no association between me and the team that conducted the hacking experiment. This [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3114,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,39,21,40,22,28],"tags":[],"class_list":{"0":"post-3130","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en","8":"category-defense-en","9":"category-europe-en","10":"category-france-en","11":"category-hacking-en","12":"category-satellite-en"},"a3_pvc":{"activated":false,"total_views":0,"today_views":0},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the satellite. Both activities are independent of each other and were carried out by different teams. There is no association between me and the team that conducted the hacking experiment. This [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-18T07:58:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T08:53:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model\",\"datePublished\":\"2025-03-18T07:58:59+00:00\",\"dateModified\":\"2025-03-18T08:53:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/\"},\"wordCount\":2820,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Summary-of-the-full-attack-flow.jpg\",\"articleSection\":[\"Cyber\",\"D\u00e9fense\",\"Europe\",\"France\",\"Hacking\",\"Satellite\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/\",\"name\":\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Summary-of-the-full-attack-flow.jpg\",\"datePublished\":\"2025-03-18T07:58:59+00:00\",\"dateModified\":\"2025-03-18T08:53:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Summary-of-the-full-attack-flow.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Summary-of-the-full-attack-flow.jpg\",\"width\":940,\"height\":538},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/","og_locale":"en_US","og_type":"article","og_title":"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model - Space &amp; Cybersecurity Info","og_description":"Disclaimer Please be informed that the analysis detailed in this article is entirely separate from the hacking experiment conducted by the Thales team on the satellite. Both activities are independent of each other and were carried out by different teams. There is no association between me and the team that conducted the hacking experiment. This [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2025-03-18T07:58:59+00:00","article_modified_time":"2025-03-18T08:53:39+00:00","og_image":[{"width":940,"height":538,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model","datePublished":"2025-03-18T07:58:59+00:00","dateModified":"2025-03-18T08:53:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/"},"wordCount":2820,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg","articleSection":["Cyber","D\u00e9fense","Europe","France","Hacking","Satellite"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/","url":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/","name":"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg","datePublished":"2025-03-18T07:58:59+00:00","dateModified":"2025-03-18T08:53:39+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2025\/03\/Summary-of-the-full-attack-flow.jpg","width":940,"height":538},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/an-analysis-of-the-thales-satellite-hacking-demo-at-cysat-2023-with-the-mitre-emb3d-threat-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"An analysis of the Thales satellite hacking demo at CYSAT 2023 with the MITRE EMB3D\u2122 Threat Model"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/3130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=3130"}],"version-history":[{"count":1,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/3130\/revisions"}],"predecessor-version":[{"id":3131,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/3130\/revisions\/3131"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/3114"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=3130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=3130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=3130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}