Research Article

Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems

Table 1

List of vulnerabilities in the test network.

HostVulnerabilityScoreType

BPRemote buffer overflow0.16r2r
CPRemote buffer overflow0.16r2r
OMAcquire privileges by providing an arbitrary program name as a command-line argument0.39l2r
MTPAcquire privileges by providing an arbitrary program name as a command-line argument0.39l2r
PMSRemote buffer overflow0.16r2r