Commit 638c6607 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Slight wording change to used product threat

parent 7925abbd
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -1023,9 +1023,9 @@ Mitigations for Impact:

* High to Low: TODO

### C.4.15 TH-USED: Access to data via acquisition of used product
### C.4.15 TH-USED: Access to data via access to used product

Attacker may get unauthorized access to confidential data stored on the product through acquisition of a device containing the used product.
Attacker may get unauthorized access to confidential data stored on the product through access to or acquisition of a device containing the used product.

| Risk factors      | Likelihood | Security profiles |
|-------------------|------------|-------------------|