{"vuid":"VU#789985","idnumber":"789985","name":"Physical access to a computer system can be used to bypass software-based access control mechanisms","keywords":["physical access"],"overview":"An intruder who gains physical access to a computer system can bypass software-based control mechanisms.","clean_desc":"If an intruder can gain physical access to a computer resource, he can bypass software-based access control mechanisms, install Trojans horses, install hardware to facilitate subsequent access, copy data to another device, boot the computer into another operating system, modify data stored on the device, or destroy, steal, or disable physical components, including security-related components. This has been well documented. See http://security.uchicago.edu/docs/physicalsec.shtml\nhttp://www.unixtools.com/security.html\nhttp://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/security/5min/5min-203.asp\nhttp://www.utoronto.ca/security/policies.html\nhttp://www.cio.gov.bc.ca/itsp/sec72.htm Data may be protected by encrypting it using strong cryptography. However, an intruder is still able to copy or modify the encrypted data. If the data is copied, an intruder may have the resources available to conduct off-line cryptographic attacks against the data. If the data is modified, it may be rendered useless. Alternately, the intruder may be able to insert a Trojan horse that will lead to subsequent compromise. You should not assume that access control lists or other software-based security mechanisms provided by an operating system will prevent an intruder from gaining access to data if the intruder can boot the computer into an alternate operating system.","impact":"An intruder who gains physical access to a computer system can alter or control any aspect of the hardware and software. Encrypted data may provide protection against data theft.","resolution":"Restrict physical access to computer systems to only those personnel who must have access. Consider using an encrypting file system or database to encrypt data stored on mobile devices such as laptops or PDAs. Restrict access to network closets or data centers.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Shawn V Hernan.","public":["http://security.uchicago.edu/docs/physicalsec.shtml","http://www.unixtools.com/security.html","http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/security/5min/5min-203.asp","http://www.utoronto.ca/security/policies.html","http://www.cio.gov.bc.ca/itsp/sec72.htm"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-02-20T15:34:42Z","publicdate":"1970-01-01T00:00:00Z","datefirstpublished":"2003-03-06T22:23:39Z","dateupdated":"2017-07-10T13:20:06Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"1","vrda_d1_impact":"1","cam_widelyknown":"20","cam_exploitation":"20","cam_internetinfrastructure":"20","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"1","cam_scorecurrent":"9","cam_scorecurrentwidelyknown":"9","cam_scorecurrentwidelyknownexploited":"9","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":9.0,"vulnote":null}