Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed-with-Review | C | 684 | Incorrect Provision of Specified Functionality |
ParentOf | Allowed | B | 1242 | Inclusion of Undocumented Features or Chicken Bits |
ParentOf | Allowed-with-Review | C | 506 | Embedded Malicious Code |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1371 | ICS Supply Chain: Poorly Documented or Undocumented Features |
MemberOf | Prohibited | C | 1412 | Comprehensive Categorization: Poor Coding Practices |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-305 | ICS/OT (technology class) Weaknesses |
MemberOf | Prohibited | BS | BOSS-307 | Not Technology-Specific (technology class) Weaknesses |
MemberOf | Prohibited | BS | BOSS-326 | Varies by Context (impact) |
MemberOf | Prohibited | BS | BOSS-330 | Alter Execution Logic (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1371 | ICS Supply Chain: Poorly Documented or Undocumented Features |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|