Loading EN-304-626.md +5 −5 Original line number Diff line number Diff line Loading @@ -1834,10 +1834,10 @@ Attacker may use known exploitable vulnerabilities in the product implementation | ADMN = 2 & SUPP = 2 | High | MOB-1, PC-1, LA-1 | | Risk factors | Impact | Security profiles | |---------------------------------|--------|----------------------------------------------------------------------| |---------------------------------|--------|----------------------------------------------------------| | max(PPII, SNDS, SNDT, SENF) = 0 | Low | LR, IoT-1 | | max(PPII, SNDS, SNDT, SENF) = 1 | Medium | IoT-2, IoT-3 | | max(PPII, SNDS, SNDT, SENF) = 2 | High | WE-2, RO-1, IoT-3, WE-1, PC-\*, LA-1, PS-1, OT-1, MOB-1, LA-2, SE-\* | | max(PPII, SNDS, SNDT, SENF) = 2 | High | RO-1, OT-1, WE-2, MOB-1, WE-1, PC-\*, LA-\*, PS-1, SE-\* | Requirements that mitigate this threat: NKEV, SSDD, MSAF, LMII, SCUD, LMAS, DMIN, AVAI, LOGG, VULH Loading Loading
EN-304-626.md +5 −5 Original line number Diff line number Diff line Loading @@ -1834,10 +1834,10 @@ Attacker may use known exploitable vulnerabilities in the product implementation | ADMN = 2 & SUPP = 2 | High | MOB-1, PC-1, LA-1 | | Risk factors | Impact | Security profiles | |---------------------------------|--------|----------------------------------------------------------------------| |---------------------------------|--------|----------------------------------------------------------| | max(PPII, SNDS, SNDT, SENF) = 0 | Low | LR, IoT-1 | | max(PPII, SNDS, SNDT, SENF) = 1 | Medium | IoT-2, IoT-3 | | max(PPII, SNDS, SNDT, SENF) = 2 | High | WE-2, RO-1, IoT-3, WE-1, PC-\*, LA-1, PS-1, OT-1, MOB-1, LA-2, SE-\* | | max(PPII, SNDS, SNDT, SENF) = 2 | High | RO-1, OT-1, WE-2, MOB-1, WE-1, PC-\*, LA-\*, PS-1, SE-\* | Requirements that mitigate this threat: NKEV, SSDD, MSAF, LMII, SCUD, LMAS, DMIN, AVAI, LOGG, VULH Loading