Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VRT Addition - Hardware and Physical Security #410

Merged
merged 28 commits into from Apr 1, 2024

Conversation

TimmyBugcrowd
Copy link
Contributor

@TimmyBugcrowd TimmyBugcrowd commented Mar 19, 2024

Adding:
Physical Security Issues - Bypass of physical access control - VARIES
Physical Security Issues - Weakness in physical access control - Clonable Key - VARIES
Physical Security Issues - Weakness in physical access control - Master Key Identification - VARIES
Physical Security Issues - Weakness in physical access control - Commonly Keyed System - P2

Insecure OS/Firmware - Weakness in Firmware Updates - Firmware cannot be updated - VARIES
Insecure OS/Firmware - Weakness in Firmware Updates - Firmware does not validate update integrity- P3
Insecure OS/Firmware - Weakness in Firmware Updates - Firmware is not encrypted- P5

Insecure OS/Firmware - Kiosk Escape or Breakout - VARIES
Insecure OS/Firmware - Poorly Configured Disk Encryption - VARIES
Insecure OS/Firmware - Shared Credentials on Storage - P3
Insecure OS/Firmware - Over-Permissioned Credentials on Storage - P2
Insecure OS/Firmware - Local Administrator on default environment - P2
Insecure OS/Firmware - Poorly Configured Operating System Security - VARIES
Insecure OS/Firmware - Recovery of Disk Contains Sensitive Material - VARIES
Insecure OS/Firmware - Failure to Remove Sensitive Artifacts from Disk - VARIES

Insecure OS/Firmware - Data not encrypted at rest - Sensitive - VARIES
Insecure OS/Firmware - Data not encrypted at rest - Non sensitive - P5

@jhadeepakkumar14
Copy link
Contributor

@TimmyBugcrowd It seems secure-code-warrior-links.json is not updated with the new vrt items.

➜  vulnerability-rating-taxonomy git:(1.13-version-vulnerabilty.json) ✗ python3 lib/validate_artifacts.py
/Users/bugcrowd/Library/Python/3.9/lib/python/site-packages/urllib3/__init__.py:35: NotOpenSSLWarning: urllib3 v2 only supports OpenSSL 1.1.1+, currently the 'ssl' module is compiled with 'LibreSSL 2.8.3'. See: https://github.com/urllib3/urllib3/issues/3020
  warnings.warn(
/Users/bugcrowd/projects/vulnerability-rating-taxonomy/third-party-mappings/remediation_training/secure-code-warrior-links.json
SCW Document is invalid, copy the artifact to the remediation training

}
},
{
"id": "weakness_in_firmware_updates",
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@TimmyBugcrowd taxonomy mentioned in the PR descriptio doesn't match with the JSON.
I can see that 'Command Injection' is added as a subcategory but under it there are no children, instead all expected children are added separately under "Insecure OS/Firmware" itself.
Is this expected ?

Here are the line items that I was able to observe
Insecure OS/Firmware - Command Injection - Weakness in Firmware Updates - Firmware cannot be updated - VARIES
Insecure OS/Firmware - Command Injection - Weakness in Firmware Updates - Firmware does not validate update integrity- P3
Insecure OS/Firmware - Command Injection - Weakness in Firmware Updates - Firmware is not encrypted- P5

Insecure OS/Firmware - Command Injection - Kiosk Escape or Breakout - VARIES
Insecure OS/Firmware - Command Injection - Poorly Configured Disk Encryption - VARIES
Insecure OS/Firmware - Command Injection - Shared Credentials on Storage - P3
Insecure OS/Firmware - Command Injection - Over-Permissioned Credentials on Storage - P2
Insecure OS/Firmware - Command Injection - Local Administrator on default environment - P2
Insecure OS/Firmware - Command Injection - Poorly Configured Operating System Security - VARIES
Insecure OS/Firmware - Command Injection - Recovery of Disk Contains Sensitive Material - VARIES
Insecure OS/Firmware - Command Injection - Failure to Remove Sensitive Artifacts from Disk - VARIES

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That is expected. I just corrected the description above. Nice catch and thank you!

@TimmyBugcrowd TimmyBugcrowd changed the title Update vulnerability-rating-taxonomy.json VRT Addition - Hardware and Physical Security Apr 1, 2024
Copy link
Collaborator

@abhinav-nain abhinav-nain left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@nnons nnons self-requested a review April 1, 2024 13:40
Copy link

@nnons nnons left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving on behalf of confirming parties here

@nnons nnons merged commit 6dbb653 into master Apr 1, 2024
1 check passed
@nnons nnons deleted the 1.13-version-vulnerabilty.json branch April 1, 2024 13:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants