@@ -1706,18 +1706,6 @@ Type: Affects impact of attack.
***[INT-L-1]** Product is connected to host system via internal adapter requiring disassembly to change
***[INT-L-2]** Product is fully integrated into and cannot be removed from host system
**[DOS]** Cumulative network bandwidth
Description: The estimated cumulative network bandwidth of deployed products that are similar enough to be similarly affected by most security problems in this product.
Rationale: The more bandwidth that can be used for a DDOS attack by exploiting a vulnerability in the product, the higher the level of security that should be required.
Type: Affects impact of attack.
***[DOS-L-0]** Foreseeable deployment includes little or no cumulative network bandwidth
***[DOS-L-1]** Foreseeable deployment includes enough bandwidth to provide 10% of a major DDoS attack
***[DOS-L-2]** Foreseeable deployment includes enough bandwidth to provide more than 10% of a major DDoS attack
## C.3 Assumptions
### C.3.1 Proper host system
@@ -1760,7 +1748,7 @@ The risk factors by type are:
* Likelihood: PHY SFT NET COM ADM LIS
* Impact: SYS SDS SDT FUN INT DOS
* Impact: SYS SDS SDT FUN INT
The mitigations that reduce risk by type are:
@@ -1781,10 +1769,10 @@ Attacker may use unknown exploitable vulnerabilities in the product implementati
| max(PHY, SFT, NET) = 2 & COM = 2 | High | WL-2, WL-3, VI-2 |