Definitions from : - IEEE Standards Working Group Areas

advertisement
Vulnerability Dimensions V2C Comments
Cyan Group Editor: Satoshi Fujitani
Definitions from CC tutorial (see http://niap.nist.gov/briefings/):
Confidentiality
Unauthorized disclosure (a.k.a., privacy)
Integrity
Unauthorized modification
Availability
Loss of use
Asset
A useful or valuable quality, person, or thing; an advantage or
resource (http://www.dictionary.com/)
Threat Agent
Person responsible for causing harm to a system in the form of
destruction, disclosure, modification of data, and/or denial of
service
Guidelines used in column categorization:
 Most of items “Denial of Service” in Cyan have a category “Availability”.
 Threat Agent Categories: Who: Unauthorized Guest, User, Admin and Hacker
 Asset Categories: User Documents, MFPs, Configuration files, Supplies,
Audit/Utilization data, other equipment on the network
Notes / Specific comments:
We might be focusing on too difficult situations for Hacker. Following matrix shows how
many threats-vulnerability hacker does.
Matrix of Vulnerability-Threat, Assets and Agent.
Assets \ Agent
MFPs
Unauthorized Guest
Unplug or damage power code
Electrically shorting phone line to
AC
Insertion of telephone in the loop
Take device offline
Disable Scan service
Disable Copier service
Force errors in the print engine or
scan engine during copy to prevent
that engine from being used by
others
User
Unplug or damage power code
Electrically shorting phone line to
AC
Send solid black pages to exhaust
supplies or damage mechanism
Insertion of telephone in the loop
Take device offline
Disable Scan service
Disable Copier service
Unsupported PDL causes lockup
Send a PostScript, PJL or other
job that generates a flood of
backchannel messages
Send an IPP job that generates a
flood of email notifications.
Interrupt copy job and never reprioritize it
Force errors in the print engine or
scan engine during copy to
prevent that engine from being
used by others
Denial of workflow
Admin
Unplug or damage power code
Electrically shorting phone line to
AC
Insertion of telephone in the loop
Take device offline
Disable Copier / scan service
Modify connection/connectivity
settings
Reset factory default
Download modified firmware that
disables the device
Unauthorized firmware update that
never completes negotiation with
remote workstation
Sending huge documents or
excessive copies of document
over and over to one or more
destination workstations
Unauthorized firmware that sends
destructive commands
downstream the work flow based
on events associated with or
caused by the interpretation of
scanned information
Unauthorized firmware update that
never completes negotiation with
remote fax machine
Setting of Fax send speed to
lowest bit rate
Changing of Fax shortcut phone
numbers
Force errors in the print engine or
scan engine during copy to
prevent that engine from being
used by others
Mis-configured hardcopy device
has an open mail relay which
allows routing many email
messages through the printer
Hacker
Unplug or damage power code
Physical injection of noise
Electrically shorting phone line to AC
Unauthorized firmware update always
reports device malfunction
Interfering/damaging paper rolls producing
bad images / malfunction
Mechanically / electronically interfere
Interfere with light source
Take device offline
Modify connection/connectivity settings
Reset factory default
Looping execution
PDL vulnerabilities
Unauthorized RIP firmware update
Flooding attack stops network service
temporary
Crafted packet fails network service
Disable Scan service
Denial of workflow service by degrading
quality, performance of scanner
Alteration of mechanical / optical / electronic
components to degrade quality of scan /
copier results
Dial into FAX modem never completes Fax
training sequence
Send solid black pages to exhaust supplies
or damage mechanism
Send full page grayscale pages with lowest
bit rate
Unauthorized firmware update always report
Fax destination number as busy
Insertion of telephone in the loop
Disable Copier service
Unauthorized firmware update always
reports Copier malfunction
Electronically shorting cables connecting
option units
Flash update attacks, such as flashing with a
corrupted file, or starting a flash memory
update cycle without ever finishing
Change another IP address to be the same
as the IP address of the hardcopy device
Replace a Cat5 cable with a Cat3
User documents
Delete stored print jobs
Changing of Fax shortcut phone
numbers
Use SNMP, Telnet or other protocol to
disable the device
Download modified firmware that disables
the device
Open all available TCP connections and
keep them active
Unauthorized firmware update that never
completes negotiation with remote
workstation
Sending huge documents or excessive
copies of document over and over to one or
more destination workstations
Unauthorized firmware that sends
destructive commands downstream the work
flow based on events associated with or
caused by the interpretation of scanned
information
Unauthorized firmware update that never
completes negotiation with remote fax
machine
Setting of Fax send speed to lowest bit rate
Changing of Fax shortcut phone numbers
Force errors in the print engine or scan
engine during copy to prevent that engine
from being used by others
Setting a very short interval on a network
operation
Loading of a rogue application (e.g. Java) to
flood the network with traffic
The hardcopy device is set to the IP address
of a device
Use FTP to load firmware file to generate a
packet flood
Send a PostScript, PJL or other job that
generates a flood of backchannel messages
Send an IPP job that generates a flood of
email notifications.
Mis-configured hardcopy device has an open
mail relay which allows routing many email
messages through the printer
Electromagnetic sniffing laser head, phone
lines, EM emissions
Destructive Operations (fonts / files removal,
modification)
Disable scan service from workflow by
making the application send unauthorized
Config files
Take device offline
Disable Scan service
Disable Copier serivce
Take device offline
Disable Scan service
Disable Copier serivce
Take device offline
Modify connection/connectivity
settings
Reset factory default
Disable Scan service
Disable Copier serivce
Supplies
Removal user replaceable supplies
Copier solid black pages to
exhaust supplies or damage
mechanism
Removal user replaceable
supplies
Scan solid black pages to exhaust
supplies or damage mechanism
Send solid black pages to exhaust
supplies or damage mechanism
Copier solid black pages to
exhaust supplies or damage
mechanism
Removal user replaceable
supplies
Scan solid black pages to exhaust
supplies or damage mechanism
Copier solid black pages to
exhaust supplies or damage
mechanism
Audit data
Utility data
commands to the scanner
Denial of workflow service by degrading
quality of copier
Changing of Fax shortcut phone numbers
Take device offline
Modify connection/connectivity settings
Reset factory default
Disable Scan service
Change scanner config work only in lowest
resolution, etc.
Cause unrecoverable “double feed” error
through firmware / electromechanical means
Unauthorized setting of scanning /copier
parameters
Set modem config always negotiate to very
lowest bit rate
Disable FAX service
Changing the country setting of Fax modem
Changing FAX config to send/receive only in
highest resolution
Disable Copier service
Changing Copier configuration to work only
in lowest resolution, etc
Disabling ports and/or protocols
Change language or lock front panel
Change settings to cause print or scan job
errors
Change settings to create additional and
unnecessary work
Change the management interface access
credentials
Change print restrictions so users/groups are
denied access
Disable or Damage ID device
Removal user replaceable supplies
Scan solid black pages to exhaust supplies
or damage mechanism
Copier solid black pages to exhaust supplies
or damage mechanism
Unauthorized Access or alteration
Intercept notification
Destructive Operations (fonts / files removal,
modification)
Fonts data
Other equipment
on network
Send a PostScript, PJL or other
job that generates a flood of
backchannel messages
Send an IPP job that generates a
flood of email notifications.
Unauthorized firmware update that
never completes negotiation with
remote workstation
Sending huge documents or
excessive copies of document
over and over to one or more
destination workstations
Unauthorized firmware that sends
destructive commands
downstream the work flow based
on events associated with or
caused by the interpretation of
scanned information
Unauthorized firmware update that
never completes negotiation with
remote fax machine
Setting of Fax send speed to
lowest bit rate
Mis-configured hardcopy device
has an open mail relay which
allows routing many email
messages through the printer
Destructive Operations (fonts / files removal,
modification)
Disable scan service from workflow by
making the application send unauthorized
commands to the scanner
Denial of workflow service by degrading
quality of copier
Change another IP address to be the same
as the IP address of the hardcopy device
Unauthorized firmware update that never
completes negotiation with remote
workstation
Sending huge documents or excessive
copies of document over and over to one or
more destination workstations
Unauthorized firmware that sends
destructive commands downstream the work
flow based on events associated with or
caused by the interpretation of scanned
information
Unauthorized firmware update that never
completes negotiation with remote fax
machine
Setting of Fax send speed to lowest bit rate
Setting a very short interval on a network
operation
packet flooding
Loading of a rogue application (e.g. Java) to
flood the network with traffic
The hardcopy device is set to the IP address
of a device
Use FTP to load firmware file to generate a
packet flood
Send a PostScript, PJL or other job that
generates a flood of backchannel messages
Send an IPP job that generates a flood of
email notifications.
Mis-configured hardcopy device has an open
mail relay which allows routing many email
messages through the printer
Download