logo

Database

Description

The system lacks an authentication mechanism or has one that can be bypassed. Therefore, an attacker can access system resources by logging into the BIOS.

Impact

- Access disk information through other systems. - Modify and disabling machine configurations. - Delete all machine information by formatting the disk.

Recommendation

Put in place for every resource with business-critical functionality a strong authentication process and ensure that every user attempting to access it is logged in.

Threat

Unauthorized internal attacker.

Expected Remediation Time

⏱️ 120 minutes.

Fixes