Threat H.E-D.H.8

URI: H.E-D.H.8

Package: Network

< prev | next >

Description: Vulnerabilities discovered in device Host: one or more software vulnerabilities in device Host become known to attackers. This is a pre-requisite for exploitation of more specific types of vulnerabilities.

Threat Type: Primary Threat

Matching Pattern:

H.E-D.H.8
MP-H

Finds a solo Host, with optionally its manager(s) and interactive user(s).

        (empty)

        (empty)

        (empty)

CSG-FormalDeviceVerification

The software for device Host has been analysed by independent experts using formal methods and shown to be free of bugs. It is therefore guaranteed to work correctly for arbitrary (even malicious) inputs. However, this is only possible for simple devices. Note that it does not prevent bugs that are present being discovered and exploited by attackers, so it is a prior mitigation only which is ignored in current (run-time) risk calculations (although in principle no vulnerabilities should ever be found).

CSG-HostCertification

The software and hardware at device Host has been assessed and certified to be secure by independent experts. The device is unlikely to contain exploitable bugs, though the assessment may become outdated so should be renewed from time to time. Note that this does not prevent bugs that are present being discovered and exploited by attackers, so it is a prior mitigation only which is ignored in current (run-time) risk calculations.

CSG-PatchingAtHost

Use a systematic procedure for regular security patching of software used (including hosted processes) on device Host, and have a contingency plan included in the system operating policies and practices for HostManager to manually apply patches immediately should the need for them become urgent.

CSG-PenTestingOfHost

The software and hardware at device Host has been tested and certified to be secure by independent experts. The device is unlikely to contain exploitable bugs, though the assessment may become outdated so should be renewed from time to time. Note that this does not prevent bugs that are present being discovered and exploited by attackers, so it is a prior mitigation only which is ignored in current (run-time) risk calculations.

CSG-SoftwareUpdatingAtHost

Use a systematic procedure for updating software used (including hosted processes) on device Host.