Threat P.W.HPsACDSrDI.2

URI: P.W.HPsACDSrDI.2

Package: VulnerabilityCVSS

< prev | next >

Description: Malware infection of Process via stored input Data: if the stored copy of Data on Host is infected with malware, then process Process may be affected when it uses the data as an input.

Threat Type: Primary Threat

Matching Pattern:

P.W.HPsACDSrDI.2
MP-HPsACDSrDI

Finds a Host running a Process that CRUD reads a locally stored copy of Data it uses as input, plus any location context for access to the Host with the rights of the Process, and optionally the Host and Process managers.

        (empty)

        (empty)

        (empty)

CSG-AntiMalwareAtHost

Anti-malware software is installed on device Host and kept up to date by regular software patches, and so can detect and prevent the execution of malicious code.

CSG-PatchingAtProcess

Use a systematic procedure for regular security patching of software used (including hosted process Process) on device Host, and have a contingency plan included in the system operating policies and practices for HostManager to manually apply patches immediately for Process should the need for them become urgent.

CSG-PatchingAtProcess-Implementation

Represents a situation in which software patches have been applied manually by HostManager to eliminate vulnerabilities in process Process. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. Note that this should only be considered if a suitable software patch is available. To implement this at runtime, signal the responsible user HostManager.