Threat H.W.HLoH.3

URI: H.W.HLoH.3

Package: VulnerabilityCVSS

< prev | next >

Description: Adjacent malware exploit on device Host from RemoteHost: malware on device RemoteHost sends a message containing malicious content designed to exploit a bug in Host and install itself there, without authentication.

Threat Type: Primary Threat

Matching Pattern:

H.W.HLoH.3
MP-HLoH

Finds a Host with optional system manager, connected to a Layer 2 Logical Subnet, and the associated network Interface, and a second, distinct host on the same subnet.

        (empty)

        (empty)

        (empty)

CSG-AntiMalwareAtHost

Anti-malware software is installed on device Host and kept up to date by regular software patches, and so can detect and prevent the execution of malicious code.

CSG-PatchingAtHost

Use a systematic procedure for regular security patching of software used (including hosted processes) on device Host, and have a contingency plan included in the system operating policies and practices for HostManager to manually apply patches immediately should the need for them become urgent.

CSG-PatchingAtHost-Implementation

Represents a situation in which software patches have been applied manually by HostManager to eliminate vulnerabilities in device Host. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Note that this should only be considered if a suitable software patch is available. To implement this at runtime, signal the responsible user HostManager. Then deselect the SoftwarePatched control and restore the asserted Extrinsic TW levels of Host once the update has been confirmed.