Research Article

An Automatic Planning-Based Attack Path Discovery Approach from IT to OT Networks

Table 4

Vulnerability information in the experimental environment.

Vul.IDVulnerabilityATT_VectorPreconditionPostconditionTactics/techniques

Vul1LNK remote code executionLocalUSB access/crafted LNK filesExecute any codeIA/replication through removable media
Vul2Credentials leakLocalPlaintext record fileCredential acquisitionLM/valid accounts
Vul3OS command injectionRemoteSSH passwordExecute any codeLM/remote services
Vul4BITS improper privilege managementLocalUSER loginAdministrator (windows)PE/exploitation for privilege escalation
Vul5Permissions and access controlsRemoteUSER loginRoot (linux)PE/exploitation for privilege escalation
Vul6Memory buffer overflowRemoteCrafted URLExecute any codeIA/exploit public-facing application
Vul7Improper access controlRemoteCrafted e-mail messagesExecute any codeIA/exploit public-facing application
Vul8DNS server remote code executionRemoteMalicious requestsExecute any codeIA/exploit public-facing application
Vul9Path traversalRemotePort scanCredential acquisitionCA/exploitation for credential access
Vul10Plaintext credentialsRemoteCredentialLoginLM/valid accounts
Vul11SMBv3 remote code executionRemoteUSERExecute any codeLM/exploitation of remote services
Vul12Kernel improper privilege managementLocalUSER loginRoot (linux)PE/exploitation for privilege escalation
Vul13SQL server remote code executionRemoteIncorrect page requestExecute any codeIA/exploit public-facing application
Vul14Code injectionRemoteCrafted RPC requestExecute any codeLM/exploitation of remote services
Vul15Brute forceRemoteCredentialLoginLM/valid accounts
Vul16SMB remote code executionRemoteUSERExecute any codeLM/exploitation of remote services
Vul17Unrestricted upload of fileRemoteJSP file/HTTP requestExecute any codeIA/exploit public-facing application
Vul18Modify Configuration projectRemoteMalicious Configuration projectImpair HMI control functionP/modify program
Vul19Modify control logicRemoteMalicious control logicPLC denial of serviceP/modify program
Vul20Modify parameters/ModesRemoteMalicious operationsPLC denial of serviceIPC/modify parameter
Vul21Plaintext control commandRemoteCrafted control commandPLC denial of serviceIPC/unauthorized command message
Vul22Uncontrolled resource consumptionRemoteHigh volume of requestsPLC denial of serviceIRF/denial of service
Vul23Fake MAC addressRemoteScan devices/traffic forward/Modify dataPLC denial of serviceC/man in the middle
Vul24Improper controlRemoteCrafted packetsPLC denial of serviceE/change operating mode