Loading EN-304-625.md +15 −15 Original line number Diff line number Diff line Loading @@ -1816,10 +1816,10 @@ The mitigations that reduce risk by type are: Attacker may use unknown exploitable vulnerabilities in the product implementation to get unauthorized access to product assets. | Risk factors | Likelihood | Security profiles | |------------------------------------|------------|------------------------------| | max(PHYS, SFT, NET) = 0 or COM = 0 | Low | WD-1, VI-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1, VI-1 | | max(PHYS, SFT, NET) = 2 & COM = 2 | High | WL-2, WL-3, VI-2 | |-----------------------------------|------------|------------------------| | max(PHY, SFT, NET) = 0 or COM = 0 | Low | WD-1, VI-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1 | | max(PHY, SFT, NET) = 2 & COM = 2 | High | WL-2, WL-3, VI-2 | | Risk factors | Impact | Security profiles | |----------------------------------|--------|------------------------------------| Loading @@ -1846,10 +1846,10 @@ Mitigations for Impact: Attacker may use known exploitable vulnerabilities in the product implementation to get unauthorized access to product assets. | Risk factors | Likelihood | Security profiles | |-----------------------------------------------|------------|------------------------------| | max(PHYS, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | |----------------------------------------------|------------|------------------------------| | max(PHY, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1, VI-1 | | max(PHYS, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | max(PHY, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | Risk factors | Impact | Security profiles | |----------------------------------|--------|------------------------------------| Loading Loading @@ -1962,10 +1962,10 @@ Mitigations for Impact: Attacker may exploit vulnerabilities in the product to reduce availability of product assets. | Risk factors | Likelihood | Security profiles | |-----------------------------------------------|------------|------------------------------| | max(PHYS, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | |----------------------------------------------|------------|------------------------------| | max(PHY, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1, VI-1 | | max(PHYS, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | max(PHY, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | Risk factors | Impact | Security profiles | |------------------------|--------|-------------------------| Loading Loading
EN-304-625.md +15 −15 Original line number Diff line number Diff line Loading @@ -1816,10 +1816,10 @@ The mitigations that reduce risk by type are: Attacker may use unknown exploitable vulnerabilities in the product implementation to get unauthorized access to product assets. | Risk factors | Likelihood | Security profiles | |------------------------------------|------------|------------------------------| | max(PHYS, SFT, NET) = 0 or COM = 0 | Low | WD-1, VI-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1, VI-1 | | max(PHYS, SFT, NET) = 2 & COM = 2 | High | WL-2, WL-3, VI-2 | |-----------------------------------|------------|------------------------| | max(PHY, SFT, NET) = 0 or COM = 0 | Low | WD-1, VI-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1 | | max(PHY, SFT, NET) = 2 & COM = 2 | High | WL-2, WL-3, VI-2 | | Risk factors | Impact | Security profiles | |----------------------------------|--------|------------------------------------| Loading @@ -1846,10 +1846,10 @@ Mitigations for Impact: Attacker may use known exploitable vulnerabilities in the product implementation to get unauthorized access to product assets. | Risk factors | Likelihood | Security profiles | |-----------------------------------------------|------------|------------------------------| | max(PHYS, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | |----------------------------------------------|------------|------------------------------| | max(PHY, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1, VI-1 | | max(PHYS, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | max(PHY, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | Risk factors | Impact | Security profiles | |----------------------------------|--------|------------------------------------| Loading Loading @@ -1962,10 +1962,10 @@ Mitigations for Impact: Attacker may exploit vulnerabilities in the product to reduce availability of product assets. | Risk factors | Likelihood | Security profiles | |-----------------------------------------------|------------|------------------------------| | max(PHYS, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | |----------------------------------------------|------------|------------------------------| | max(PHY, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low | WD-1 | | all others | Medium | WD-2, WD-3, WD-4, WL-1, VI-1 | | max(PHYS, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | max(PHY, SFT, NET) = 2 & COM = 2 & ADM = 2 | High | WL-2, WL-3, VI-2 | | Risk factors | Impact | Security profiles | |------------------------|--------|-------------------------| Loading