From the course: Vulnerability Management: Assessing the Risks with CVSS v3.1

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Challenge

Challenge

(upbeat music) - Ready for another challenge, this time, we're going to take that vulnerability from the exercise in chapter three, and customize it for the Red 30 tech environment. In our earlier exercise Red 30 tech was notified that a new vulnerability in the company's bookkeeping software was discovered. Then we used our CVSS risk assessment skills and came up with a base score for this vulnerability under normal circumstances. And that was 6.5 or medium. Reread the vulnerability description and look for clues that might impact the risk assessment of this particular vulnerability and Red 30's network. Now, if you recall in an earlier video, we talked about Sue. Sue runs Red 30's bookkeeping software, the specific software that has this vulnerability, and she has local administrator rights on her computer because that bookkeeping software requires it in order to function properly. You've already done the base score…

Contents