Requirements that mitigate this threat: NKEV, SSDD, MSAF, LMII, SCUD, LMAS, DMIN, AVAI, LOGG, VULH
Requirements that mitigate this threat: NKEV, SSDD, SDEF, MSAF, LMII, LMAS, LOGG
All mitigations from TH-UEVU apply (using that requirement's risk formula), in addition to:
@@ -1853,12 +1854,6 @@ Mitigations for Likelihood:
* High to Low: KEVA, KEVM, (KEVT or SCAN), (SUAP or SUAO), VULH
Mitigations for Impact:
* Medium to Low: WDOG
* High to Low: WDOG
### C.4.5 TH-UAPP: Unauthorized access to product assets via unprotected physical interfaces in default configuration
Attacker may use unprotected debug or management interfaces to get unauthorized access to product assets via physical access in the default configuration of the product.
@@ -1960,10 +1955,10 @@ Attacker may use network access to get unauthorized access to confidential data