| Secure deletion and data transfer | SCDL, SDTR |
| Vulnerability handling | VULH |
@@ -930,7 +930,7 @@ Table: _Table C.13_
Table: _Table C.14_
Requirements that mitigate this threat: CRYPT, AUTH, ROUT, DNSL
Requirements that mitigate this threat: EISO, CRYPT, AUTH, ROUT, DNSL
Mitigations for Likelihood:
@@ -964,13 +964,13 @@ Table: _Table C.13_
Table: _Table C.14_
Requirements that mitigate this threat: NUTI, CRYPT, AUTH, ROUT, DNSL
Requirements that mitigate this threat: CRYPT, AUTH, ROUT, DNSL
Mitigations for Likelihood:
* Medium to Low: NUTI-1, CRYPT-2, ROUT-1, AUTH-1, AUTH-2
* Medium to Low: CRYPT-2, ROUT-1, AUTH-1, AUTH-2
* High to Low: NUTI-1, NUTI-2, DNSL-6, CRYPT-1, CRYPT-2, ROUT-1, ROUT-2, ROUT-3, AUTH-1, AUTH-2, AUTH-3, AUTH-4, AUTH-5, AUTH-6
* High to Low: DNSL-6, CRYPT-1, CRYPT-2, ROUT-1, ROUT-2, ROUT-3, AUTH-1, AUTH-2, AUTH-3, AUTH-4, AUTH-5, AUTH-6
Mitigations for Impact:
@@ -1043,7 +1043,7 @@ Mitigations for Impact:
* High to Low: CDST
### C.4.12 TH-CONF: Access to assets via configuration errors in single endpoint VPN
### C.4.12 TH-CNFS: Access to assets via configuration errors in single endpoint VPN
Attacker may use configuration errors to get unauthorised access to product assets in a single endpoint VPN.
@@ -1077,7 +1077,7 @@ Mitigations for Impact:
* High to Low: AUTH-3, AUTH-4, AUTH-5, LOGG-1, LOGG-2, CDST
### C.4.12 TH-CONF: Access to assets via configuration errors in a multi-endpoint VPN
### C.4.12 TH-CNFM: Access to assets via configuration errors in a multi-endpoint VPN
Attacker may use configuration errors to get unauthorised access to product assets in a multi-endpoint VPN.
@@ -1097,7 +1097,7 @@ Table: _Table C.19_
Table: _Table C.20_
Requirements that mitigate this threat: CONF, TRAF, IPv6, CDST, DMIN, LOGG
Requirements that mitigate this threat: CONF, TRAF, IPv6, CDST, LOGG
Mitigations for Likelihood:
@@ -1182,18 +1182,18 @@ Mitigations for Impact:
Attacker may get unauthorised access to confidential data stored on the product through access to or acquisition of a device containing the used product.