Loading EN-304-626.md +10 −10 Original line number Diff line number Diff line Loading @@ -1802,10 +1802,10 @@ For each threat, both likelihood and impact must be Low before the risk is consi Attacker may use unknown exploitable vulnerabilities in the product implementation to get unauthorized access to product assets. | Risk factors | Likelihood | Security profiles | |-------------------------------------------|------------|----------------------------------------------------| | max(CUSR, DATA, PHYS, FNET) = 0 or SA-LOW | Low | LR, IoT-1 | |-------------------------------------------------|------------|----------------------------------------------------| | max(NUSR, CUSR, DATA, PHYS, FNET) = 0 or SA-LOW | Low | LR, IoT-1 | | all others | Medium | IoT-2, IoT-3, WE-1, RO-1, OT-1, PC-\*, PS-1, SE-\* | | max(CUSR, DATA, PHYS, FNET) = 2 & SA-HIGH | High | MOB-1, LA-\* | | max(NUSR, CUSR, DATA, PHYS, FNET) = 2 & SA-HIGH | High | MOB-1, LA-\* | | Risk factors | Impact | Security profiles | |---------------------------------|--------|----------------------------------------------------------------------| Loading Loading @@ -1924,10 +1924,10 @@ Mitigations for Impact: Attacker may use user or network access for a denial-of-service attack on product functions. | Risk factors | Likelihood | | |---------------------|------------|---------------------------------------------| | max(CUSR, FNET) = 0 | Low | LR, IoT-\*, | | max(CUSR, FNET) = 1 | Medium | OT-1, MOB-1, WE-1, PC-\*, LA-\*, SE-1, SE-2 | | max(CUSR, FNET) = 2 | High | RO-1, PS-1, SE-3 | |---------------------------|------------|---------------------------------------------| | max(NUSR, CUSR, FNET) = 0 | Low | LR, IoT-\*, | | max(NUSR, CUSR, FNET) = 1 | Medium | OT-1, MOB-1, WE-1, PC-\*, LA-\*, SE-1, SE-2 | | max(NUSR, CUSR, FNET) = 2 | High | RO-1, PS-1, SE-3 | | Risk factors | Impact | Security profiles | |--------------|--------|--------------------------------------| Loading Loading
EN-304-626.md +10 −10 Original line number Diff line number Diff line Loading @@ -1802,10 +1802,10 @@ For each threat, both likelihood and impact must be Low before the risk is consi Attacker may use unknown exploitable vulnerabilities in the product implementation to get unauthorized access to product assets. | Risk factors | Likelihood | Security profiles | |-------------------------------------------|------------|----------------------------------------------------| | max(CUSR, DATA, PHYS, FNET) = 0 or SA-LOW | Low | LR, IoT-1 | |-------------------------------------------------|------------|----------------------------------------------------| | max(NUSR, CUSR, DATA, PHYS, FNET) = 0 or SA-LOW | Low | LR, IoT-1 | | all others | Medium | IoT-2, IoT-3, WE-1, RO-1, OT-1, PC-\*, PS-1, SE-\* | | max(CUSR, DATA, PHYS, FNET) = 2 & SA-HIGH | High | MOB-1, LA-\* | | max(NUSR, CUSR, DATA, PHYS, FNET) = 2 & SA-HIGH | High | MOB-1, LA-\* | | Risk factors | Impact | Security profiles | |---------------------------------|--------|----------------------------------------------------------------------| Loading Loading @@ -1924,10 +1924,10 @@ Mitigations for Impact: Attacker may use user or network access for a denial-of-service attack on product functions. | Risk factors | Likelihood | | |---------------------|------------|---------------------------------------------| | max(CUSR, FNET) = 0 | Low | LR, IoT-\*, | | max(CUSR, FNET) = 1 | Medium | OT-1, MOB-1, WE-1, PC-\*, LA-\*, SE-1, SE-2 | | max(CUSR, FNET) = 2 | High | RO-1, PS-1, SE-3 | |---------------------------|------------|---------------------------------------------| | max(NUSR, CUSR, FNET) = 0 | Low | LR, IoT-\*, | | max(NUSR, CUSR, FNET) = 1 | Medium | OT-1, MOB-1, WE-1, PC-\*, LA-\*, SE-1, SE-2 | | max(NUSR, CUSR, FNET) = 2 | High | RO-1, PS-1, SE-3 | | Risk factors | Impact | Security profiles | |--------------|--------|--------------------------------------| Loading