The system lacks an authentication mechanism or has one that can be bypassed. Therefore, an attacker can access system resources by logging into the BIOS.
- Access disk information through other systems.
- Modify and disabling machine configurations.
- Delete all machine information by formatting the disk.
Put in place for every resource with business-critical functionality a strong authentication process and ensure that every user attempting to access it is logged in.
Unauthorized internal attacker.
⌚ 120 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The application restricts access to sensitive resources only to authorized users
app.post('/accessAdmin', hashedSentCode, function(req, res, next){
User.register({ _id: req.user.id}, req.body, function(err, user){
//Validating user has privileges and is correctly logged in
if (req.body.isLoggedIn && user.isSuperAdmin){
run userMFA();
user.allowBIOSAccess = True;
}
res.redirect('/profile/BIOSManager');
}
});
The application allows access to BIOS without verifying permissions and secure authentication
app.post('/accessAdmin', function(req, res, next){
User.register({ _id: req.user.id}, req.body, function(err, user){
user.allowBIOSAccess = True;
res.redirect('/profile/BIOSManager');
}
});