T1686 - Disable or Modify System Firewall
Tactics:
Defense Impairment
Defense Impairment
Platforms:
ESXi Linux macOS Network Devices +1
ESXi Linux macOS Network Devices +1
Detection:
Not specified
Not specified
Description:
Adversaries may disable or modify host-based or network firewalls to impair defensive mechanisms and enable further action. Once an adversary has gathered sufficient privileges, they can tamper with firewall services, policies, or rule sets to remove restrictions on inbound or outbound traffic. For example, this may include turning off firewall profiles, altering existing rules to permit previously blocked ports or protocols, or adding new rules that create covert communication paths (e.g., adding a new firewall rule for a well-known protocol (such as RDP) using a non-traditional and potentially less securitized port.(Citation: change_rdp_port_conti)
Adversaries may disable or modify firewalls using different behaviors, depending on the platform. For example, in ESXi, firewall rules may be modified directly via the esxcli (e.g., via esxcli network firewall set) or via the vCenter user interface.(Citation: Broadcom ESXi Firewall)(Citation: Trellix Rnasomhouse 2024)
Adversaries may disable or modify firewalls using different behaviors, depending on the platform. For example, in ESXi, firewall rules may be modified directly via the esxcli (e.g., via esxcli network firewall set) or via the vCenter user interface.(Citation: Broadcom ESXi Firewall)(Citation: Trellix Rnasomhouse 2024)
Used by Actors (13)
Malware (15)
Metadata
| MITRE ID: | T1686 |
| STIX ID: | attack-pattern--eec096b8-c207-... |
| Platforms: | ESXi, Linux, macOS, Network Devices, Windows |
| Created: | 28/04/2026 16:00 |
| Updated: | 10/05/2026 16:00 |