<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prioritizing &amp;quot;increased risk / low likelihood&amp;quot; vulnerabilities in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32468#M2269</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;Because of this, I am more inclined to infer this as "an elevated risk with a fairly low likelihood of occurrence". ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;This is a comment on the terminology you use, not your logic. I think you can pursue your logic, but recommend a modification of the terms you &amp;nbsp;use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you study risk management literature, you will see that your inferred interpretation is not possible in the way risk is addressed and calculated in business. Risk is defined as the level of impact times the likelihood of occurrence (probability). Therefore, an event with a projected cost of $1000 but a probability of occurrence of 5% is said to have a risk of $50. Likewise, an event with a projected cost of $100 and a 50% probability of occurrence also has a risk of $50. &amp;nbsp;This is the sort of calculation that major enterprises use to decide whether to mitigate, self-insure, buy commercial insurance, or ignore any given potential harmful event.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Feb 2020 20:54:57 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2020-02-06T20:54:57Z</dc:date>
    <item>
      <title>Prioritizing "increased risk / low likelihood" vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32463#M2266</link>
      <description>&lt;P&gt;I'm reading the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.hp.com/us-en/document/c06546034" target="_blank" rel="nofollow noopener"&gt;latest Security Bulletin from HP&lt;/A&gt;,&amp;nbsp;which describes a&amp;nbsp;cross-site scripting (XSS) risk from unpatched printers. Even though a&amp;nbsp;CVE has been &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18914" target="_blank" rel="noopener"&gt;assigned to this&amp;nbsp;vulnerability&lt;/A&gt;, only HP's website describes the risk -- and neither site provides much detail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because of this, I am more inclined to infer this as "an elevated risk with a fairly low likelihood of occurrence". It's not difficult to&amp;nbsp;download&amp;nbsp;and remotely install the&amp;nbsp;firmware patch, but it's still a time-consuming&amp;nbsp;process, and having lots of printers doesn't help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm interested to hear how you prioritize such&amp;nbsp;events, or how much credence you attribute to such claims when there's not a lot of information available to digest. I know what&amp;nbsp;XSS&amp;nbsp;is, but I'm having a hard time visualizing an exposure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 19:45:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32463#M2266</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-02-06T19:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing "increased risk / low likelihood" vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32468#M2269</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;Because of this, I am more inclined to infer this as "an elevated risk with a fairly low likelihood of occurrence". ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eric,&lt;/P&gt;&lt;P&gt;This is a comment on the terminology you use, not your logic. I think you can pursue your logic, but recommend a modification of the terms you &amp;nbsp;use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you study risk management literature, you will see that your inferred interpretation is not possible in the way risk is addressed and calculated in business. Risk is defined as the level of impact times the likelihood of occurrence (probability). Therefore, an event with a projected cost of $1000 but a probability of occurrence of 5% is said to have a risk of $50. Likewise, an event with a projected cost of $100 and a 50% probability of occurrence also has a risk of $50. &amp;nbsp;This is the sort of calculation that major enterprises use to decide whether to mitigate, self-insure, buy commercial insurance, or ignore any given potential harmful event.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 20:54:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32468#M2269</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-02-06T20:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing "increased risk / low likelihood" vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32477#M2273</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I'm reading the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.hp.com/us-en/document/c06546034" target="_blank" rel="nofollow noopener"&gt;latest Security Bulletin from HP&lt;/A&gt;,&amp;nbsp;which describes a&amp;nbsp;cross-site scripting (XSS) risk from unpatched printers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know what&amp;nbsp;XSS&amp;nbsp;is, but I'm having a hard time visualizing an exposure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;You asked the right question! Help me &lt;EM&gt;"visualize the exposure"&lt;/EM&gt;. You need a &lt;STRONG&gt;Threat Model&lt;/STRONG&gt;! Start with visualizing your enterprise LAN/WAN that the printers are connected too. Think about users accessing printers on that network and all of the other compute resources on that same network. What could go wrong? Dig deep into applying the scoring vector &lt;STRONG&gt;CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you know is that the Attack Complexity (AC) is low, attacks will come in through a malicious link past through a users browser and without any Privileges (PR) attempt to redirect possibly sensitive information. That's the idea. What usually seals the deal for IT is showing them XSS in action. That will open their eyes wide enough to either accept the risk or put in a compensating control until there is a patch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 23:02:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32477#M2273</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2020-02-06T23:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing "increased risk / low likelihood" vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32487#M2278</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/780103681"&gt;@CraginS&lt;/a&gt;&amp;nbsp;here, a good Risk Assessment goes a long way, but would add that you must always account for the unknown.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As an example, I once worked somewhere that had a print server which had software that could only be installed/maintained by the vendor............so we put the machine under a Patch Management process (patches were to be scheduled, patches could only be applied after the media was scanned, patches could only be applied with an IT person in attendance, educate the department on the process and got agreement in writing from the vendor)....Sounds good...........until one day, a new tech came in and the folks from the department were in a meeting.....the perfect storm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The tech proceeded to use their installation kit (which had a virus on it) and installed the new OS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Within minutes of the reboot, the Help Desk began getting calls that M$ machines were experiencing the Blue Screen (of Death). The virus was actually a worm and was trying to work through the network to find machines that were not patched and eventually found some.......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So even though we thought the threat had been mitigated, it turned out not to be, therefore educating management that Risk Assessment is not an exact science is a good thing.....Ensure that they accept the risk ratings that you come up with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my nickel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 07:31:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/32487#M2278</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2020-02-07T07:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing "increased risk / low likelihood" vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/56451#M3794</link>
      <description>&lt;P&gt;I was cleaning out old drafts and found this thread.&amp;nbsp; While wondering how I dared to neglect all of these wonderful replies, I looked at the date and remembered, "Oh, yeah! That's when our &lt;EM&gt;70047c83e6cfab6f85cf9fdf0cb4fdff&lt;/EM&gt; attack happened.&amp;nbsp; No wonder I never responded!"&amp;nbsp; Plus, COVID lockdown was soon to follow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, yeah, thanks to everyone for your responses -- three years later!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 20:52:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/56451#M3794</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2023-01-03T20:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing "increased risk / low likelihood" vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/56475#M3796</link>
      <description>&lt;P&gt;This maybe an old thread but HP patched this minor vulnerability in June of 2020. Mitigation would have been to create a custom filter for any of the affected machines and block any such attempts from both the client and/or the printer themselves.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the risk? Minimal. This could have been block through directory services, filtering and user education with minimal effort to include risk analysis. Furthermore after looking into this minor threat I see no determined use or exploit being used. Annoying at best. A real threat? More like clutching pearls and hand wringing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- B/Eads&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 18:06:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/56475#M3796</guid>
      <dc:creator>Beads</dc:creator>
      <dc:date>2023-01-04T18:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing "increased risk / low likelihood" vulnerabilities</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/56486#M3797</link>
      <description>&lt;P&gt;At the time, a feral IT child (such as myself) didn't understand best practices for gaging "high / low probability" with "high / low impact", and was trying to assuage the rampant paranoia associated with feeling like "OMG WE HAVE TO FIX EVERY SECURITY CONCERN RIGHT NOW".&lt;BR /&gt;&lt;BR /&gt;I'm still a feral child, by the way.&amp;nbsp; Just grayer.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 04:28:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Prioritizing-quot-increased-risk-low-likelihood-quot/m-p/56486#M3797</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2023-01-05T04:28:21Z</dc:date>
    </item>
  </channel>
</rss>

