Authentication mechanism absence or evasion - BIOS
Description
The system lacks an authentication mechanism or has one that can be bypassed. Therefore, an attacker can access system resources by logging into the BIOS.
Impact
- Access disk information through other systems. - Modify and disabling machine configurations. - Delete all machine information by formatting the disk.
Recommendation
Put in place for every resource with business-critical functionality a strong authentication process and ensure that every user attempting to access it is logged in.
Threat
Unauthorized internal attacker.
Expected Remediation Time
⏱️ 120 minutes.
Requirements
227 - Display access notification228 - Authenticate using standard protocols229 - Request access credentials231 - Implement a biometric verification component235 - Define credential interface264 - Request authentication319 - Make authentication options equally secureFixes
Score
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
Attack vector
P
Attack complexity
L
Attack requirements
N
Privileges required
N
User interaction
N
Confidentiality (VC)
H
Integrity (VI)
H
Availability (VA)
H
Confidentiality (SC)
N
Integrity (SI)
N
Availability (SA)
N
Threat 4.0
Exploit maturity
X
Vector string
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N