Open
Description
Create a Requirements/Prerequisites association between SoftwareVulnerabilities
and Data
, Information
, Application
, or any other asset that could fit the concept. The attacker would have to compromise these assets before they are able to attempt to abuse the SoftwareVulnerabilities
. The compromise would have to be asset specific FullAccess
for Applications
and Write
for Data
/Information
might be good candidates.
While some SoftwareVulnerabilities
would still have some more nuanced or specific requirements that the coarse design outlined above, but the change would still significantly increase the modelling capabilities of the language.
Something similar could be done for HardwareVulnerabilities
if deemed relevant.