Professional Documents
Culture Documents
INSTRUCTIONS
Part 1 - Choose the Attack Type (from the drop-down menu), fill-up the table based on the chosen attack, and sum
Part 2 - Choose the Environment Type (from the drop-down menu), fill-up the table based on the chosen environm
PART 1
Information Disclosure
SUMMARY
Map the CVEs above to the principles of the CIA triad (Confidentiality, Inte
e.g. Integrity: The vulnerability could result in a compromise of data integrity. An attacker exploiting this vulnerabil
incorrect configurations or unauthorized changes within the vCenter Server environment.
PART 2
< CHOOSE THE ENVIRONMENT >
SUMMARY
Map the CVEs above to the principles of the CIA triad (Confidentiality, Inte
e.g. Availability: The vulnerability may impact the availability of the system or service. An attacker exploiting the
downtime or unavailability for legitimate users, violating the availa
TOOLS TO UTILIZE:
INSTRUCTIONS
based on the chosen attack, and summarize your findings
table based on the chosen environment, and summarize your findings
SUMMARY
of the CIA triad (Confidentiality, Integrity, and Availability)
An attacker exploiting this vulnerability could modify or tamper with data, potentially leading to
vironment.
Remote code
Update to latest version 10 High
execution
SUMMARY
of the CIA triad (Confidentiality, Integrity, and Availability)
or service. An attacker exploiting the vulnerability could potentially disrupt the system, leading to
r legitimate users, violating the availability principle.
Mobile Applications
Embedded Systems and IoT Devices
Operating Systems
Industrial Control Systems
Databases