Create a Requirements/Prerequisites association between SoftwareVulnerabilities and Data, Information, Application, or any other asset that could fit the concept. The attacker would have to compromise these assets before they are able to attempt to abuse the SoftwareVulnerabilities. The compromise would have to be asset specific FullAccess for Applications and Write for Data/Information might be good candidates.
While some SoftwareVulnerabilities would still have some more nuanced or specific requirements that the coarse design outlined above, but the change would still significantly increase the modelling capabilities of the language.
Something similar could be done for HardwareVulnerabilities if deemed relevant.
Create a Requirements/Prerequisites association between
SoftwareVulnerabilitiesandData,Information,Application, or any other asset that could fit the concept. The attacker would have to compromise these assets before they are able to attempt to abuse theSoftwareVulnerabilities. The compromise would have to be asset specificFullAccessforApplicationsandWriteforData/Informationmight be good candidates.While some
SoftwareVulnerabilitieswould still have some more nuanced or specific requirements that the coarse design outlined above, but the change would still significantly increase the modelling capabilities of the language.Something similar could be done for
HardwareVulnerabilitiesif deemed relevant.