diff --git a/src/02_framework/methodology.md b/src/02_framework/methodology.md
index 94b8390..79ce906 100644
--- a/src/02_framework/methodology.md
+++ b/src/02_framework/methodology.md
@@ -166,7 +166,7 @@ Another way to expand the catalog is to add custom components, categories and te
Business Logic |
- IOT-*-INVAL |
+ IOT-*-INPV |
Input Validation |
diff --git a/src/03_test_cases/data_exchange_services/README.md b/src/03_test_cases/data_exchange_services/README.md
index 8af1f28..11e5ff2 100644
--- a/src/03_test_cases/data_exchange_services/README.md
+++ b/src/03_test_cases/data_exchange_services/README.md
@@ -1,32 +1,28 @@
# 3.4. Data Exchange Services (IOT-DES)
## Table of Contents
-* [Overview](#overview)
-* [Authorization (IOT-DES-AUTHZ)](#authorization-iot-des-authz)
- * [Unauthorized Access to the Data Exchange Service (IOT-DES-AUTHZ-001)](#unauthorized-access-to-the-data-exchange-service-iot-des-authz-001)
- * [Privilege Escalation (IOT-DES-AUTHZ-002)](#privilege-escalation-iot-des-authz-002)
-
-* [Information Gathering (IOT-DES-INFO)](#information-gathering-iot-des-info)
- * [Disclosure of Implementation Details (IOT-DES-INFO-001)](#disclosure-of-implementation-details-iot-des-info-001)
- * [Disclosure of Ecosystem Details (IOT-DES-INFO-002)](#disclosure-of-ecosystem-details-iot-des-info-002)
- * [Disclosure of User Data (IOT-DES-INFO-003)](#disclosure-of-user-data-iot-des-info-003)
-
-* [Configuration and Patch Management (IOT-DES-CONF)](#configuration-and-patch-management-iot-des-conf)
- * [Usage of Outdated Software (IOT-DES-CONF-001)](#usage-of-outdated-software-iot-des-conf-001)
- * [Presence of Unnecessary Software and Functionalities (IOT-DES-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-des-conf-002)
-
-* [Secrets (IOT-DES-SCRT)](#secrets-iot-des-scrt)
- * [Access to Confidential Data (IOT-DES-SCRT-001)](#access-to-confidential-data-iot-des-scrt-001)
-
-* [Cryptography (IOT-DES-CRYPT)](#cryptography-iot-des-crypt)
- * [Usage of Weak Cryptographic Algorithms (IOT-DES-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-des-crypt-001)
-
-* [Business Logic (IOT-DES-LOGIC)](#business-logic-iot-des-logic)
- * [Circumvention of the Intended Business Logic (IOT-DES-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-des-logic-001)
-
-* [Input Validation (IOT-DES-INVAL)](#input-validation-iot-des-inval)
- * [Insufficient Input Validation (IOT-DES-INVAL-001)](#insufficient-input-validation-iot-des-inval-001)
- * [Code or Command Injection (IOT-DES-INVAL-002)](#code-or-command-injection-iot-des-inval-002)
+- [3.4. Data Exchange Services (IOT-DES)](#34-data-exchange-services-iot-des)
+ - [Table of Contents](#table-of-contents)
+ - [Overview](#overview)
+ - [Authorization (IOT-DES-AUTHZ)](#authorization-iot-des-authz)
+ - [Unauthorized Access to the Data Exchange Service (IOT-DES-AUTHZ-001)](#unauthorized-access-to-the-data-exchange-service-iot-des-authz-001)
+ - [Privilege Escalation (IOT-DES-AUTHZ-002)](#privilege-escalation-iot-des-authz-002)
+ - [Information Gathering (IOT-DES-INFO)](#information-gathering-iot-des-info)
+ - [Disclosure of Implementation Details (IOT-DES-INFO-001)](#disclosure-of-implementation-details-iot-des-info-001)
+ - [Disclosure of Ecosystem Details (IOT-DES-INFO-002)](#disclosure-of-ecosystem-details-iot-des-info-002)
+ - [Disclosure of User Data (IOT-DES-INFO-003)](#disclosure-of-user-data-iot-des-info-003)
+ - [Configuration and Patch Management (IOT-DES-CONF)](#configuration-and-patch-management-iot-des-conf)
+ - [Usage of Outdated Software (IOT-DES-CONF-001)](#usage-of-outdated-software-iot-des-conf-001)
+ - [Presence of Unnecessary Software and Functionalities (IOT-DES-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-des-conf-002)
+ - [Secrets (IOT-DES-SCRT)](#secrets-iot-des-scrt)
+ - [Access to Confidential Data (IOT-DES-SCRT-001)](#access-to-confidential-data-iot-des-scrt-001)
+ - [Cryptography (IOT-DES-CRYPT)](#cryptography-iot-des-crypt)
+ - [Usage of Weak Cryptographic Algorithms (IOT-DES-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-des-crypt-001)
+ - [Business Logic (IOT-DES-LOGIC)](#business-logic-iot-des-logic)
+ - [Circumvention of the Intended Business Logic (IOT-DES-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-des-logic-001)
+ - [Input Validation (IOT-DES-INPV)](#input-validation-iot-des-inpv)
+ - [Insufficient Input Validation (IOT-DES-INPV-001)](#insufficient-input-validation-iot-des-inpv-001)
+ - [Code or Command Injection (IOT-DES-INPV-002)](#code-or-command-injection-iot-des-inpv-002)
@@ -479,11 +475,11 @@ For this test case, data from the following sources was consolidated:
-## Input Validation (IOT-DES-INVAL)
+## Input Validation (IOT-DES-INPV)
In order to ensure that only valid and well-formed data enters the processing flows of a device, the input from a all untrustworthy sources, e.g., users or external systems, has to be verified and validated.
-### Insufficient Input Validation (IOT-DES-INVAL-001)
+### Insufficient Input Validation (IOT-DES-INPV-001)
**Required Access Levels**
@@ -522,7 +518,7 @@ For this test case, data from the following sources was consolidated:
* ["Practical IoT Hacking"][practical_iot_hacking] by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-### Code or Command Injection (IOT-DES-INVAL-002)
+### Code or Command Injection (IOT-DES-INPV-002)
**Required Access Levels**
@@ -543,7 +539,7 @@ If no input validation is performed or only an insufficient input validation mec
**Test Objectives**
-- Based on [IOT-DES-INVAL-001](#insufficient-input-validation-iot-des-inval-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
+- Based on [IOT-DES-INPV-001](#insufficient-input-validation-iot-des-inpv-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
**Remediation**
diff --git a/src/03_test_cases/internal_interfaces/README.md b/src/03_test_cases/internal_interfaces/README.md
index a20054e..c9237a3 100644
--- a/src/03_test_cases/internal_interfaces/README.md
+++ b/src/03_test_cases/internal_interfaces/README.md
@@ -1,26 +1,28 @@
# 3.5. Internal Interfaces (IOT-INT)
## Table of Contents
-* [Overview](#overview)
-* [Authorization (IOT-INT-AUTHZ)](#authorization-iot-int-authz)
- * [Unauthorized Access to the Interface (IOT-INT-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-int-authz-001)
- * [Privilege Escalation (IOT-INT-AUTHZ-002)](#privilege-escalation-iot-int-authz-002)
-* [Information Gathering (IOT-INT-INFO)](#information-gathering-iot-int-info)
- * [Disclosure of Implementation Details (IOT-INT-INFO-001)](#disclosure-of-implementation-details-iot-int-info-001)
- * [Disclosure of Ecosystem Details (IOT-INT-INFO-002)](#disclosure-of-ecosystem-details-iot-int-info-002)
- * [Disclosure of User Data (IOT-INT-INFO-003)](#disclosure-of-user-data-iot-int-info-003)
-* [Configuration and Patch Management (IOT-INT-CONF)](#configuration-and-patch-management-iot-int-conf)
- * [Usage of Outdated Software (IOT-INT-CONF-001)](#usage-of-outdated-software-iot-int-conf-001)
- * [Presence of Unnecessary Software and Functionalities (IOT-INT-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-int-conf-002)
-* [Secrets (IOT-INT-SCRT)](#secrets-iot-int-scrt)
- * [Access to Confidential Data (IOT-INT-SCRT-001)](#access-to-confidential-data-iot-int-scrt-001)
-* [Cryptography (IOT-INT-CRYPT)](#cryptography-iot-int-crypt)
- * [Usage of Weak Cryptographic Algorithms (IOT-INT-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-int-crypt-001)
-* [Business Logic (IOT-INT-LOGIC)](#business-logic-iot-int-logic)
- * [Circumvention of the Intended Business Logic (IOT-INT-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-int-logic-001)
-* [Input Validation (IOT-INT-INVAL)](#input-validation-iot-int-inval)
- * [Insufficient Input Validation (IOT-INT-INVAL-001)](#insufficient-input-validation-iot-int-inval-001)
- * [Code or Command Injection (IOT-INT-INVAL-002)](#code-or-command-injection-iot-int-inval-002)
+- [3.5. Internal Interfaces (IOT-INT)](#35-internal-interfaces-iot-int)
+ - [Table of Contents](#table-of-contents)
+ - [Overview](#overview)
+ - [Authorization (IOT-INT-AUTHZ)](#authorization-iot-int-authz)
+ - [Unauthorized Access to the Interface (IOT-INT-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-int-authz-001)
+ - [Privilege Escalation (IOT-INT-AUTHZ-002)](#privilege-escalation-iot-int-authz-002)
+ - [Information Gathering (IOT-INT-INFO)](#information-gathering-iot-int-info)
+ - [Disclosure of Implementation Details (IOT-INT-INFO-001)](#disclosure-of-implementation-details-iot-int-info-001)
+ - [Disclosure of Ecosystem Details (IOT-INT-INFO-002)](#disclosure-of-ecosystem-details-iot-int-info-002)
+ - [Disclosure of User Data (IOT-INT-INFO-003)](#disclosure-of-user-data-iot-int-info-003)
+ - [Configuration and Patch Management (IOT-INT-CONF)](#configuration-and-patch-management-iot-int-conf)
+ - [Usage of Outdated Software (IOT-INT-CONF-001)](#usage-of-outdated-software-iot-int-conf-001)
+ - [Presence of Unnecessary Software and Functionalities (IOT-INT-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-int-conf-002)
+ - [Secrets (IOT-INT-SCRT)](#secrets-iot-int-scrt)
+ - [Access to Confidential Data (IOT-INT-SCRT-001)](#access-to-confidential-data-iot-int-scrt-001)
+ - [Cryptography (IOT-INT-CRYPT)](#cryptography-iot-int-crypt)
+ - [Usage of Weak Cryptographic Algorithms (IOT-INT-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-int-crypt-001)
+ - [Business Logic (IOT-INT-LOGIC)](#business-logic-iot-int-logic)
+ - [Circumvention of the Intended Business Logic (IOT-INT-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-int-logic-001)
+ - [Input Validation (IOT-INT-INPV)](#input-validation-iot-int-inpv)
+ - [Insufficient Input Validation (IOT-INT-INPV-001)](#insufficient-input-validation-iot-int-inpv-001)
+ - [Code or Command Injection (IOT-INT-INPV-002)](#code-or-command-injection-iot-int-inpv-002)
@@ -470,11 +472,11 @@ This test case is based on: [IOT-DES-LOGIC-001](../data_exchange_services/README
-## Input Validation (IOT-INT-INVAL)
+## Input Validation (IOT-INT-INPV)
In order to ensure that only valid and well-formed data enters the processing flows of a device, the input from a all untrustworthy sources, e.g., users or external systems, has to be verified and validated.
-### Insufficient Input Validation (IOT-INT-INVAL-001)
+### Insufficient Input Validation (IOT-INT-INPV-001)
**Required Access Levels**
@@ -511,9 +513,9 @@ For this test case, data from the following sources was consolidated:
* ["Practical IoT Hacking"][practical_iot_hacking] by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inval-001).
+This test case is based on: [IOT-DES-INPV-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inpv-001).
-### Code or Command Injection (IOT-INT-INVAL-002)
+### Code or Command Injection (IOT-INT-INPV-002)
**Required Access Levels**
@@ -532,7 +534,7 @@ If no input validation is performed or only an insufficient input validation mec
**Test Objectives**
-- Based on [IOT-INT-INVAL-001](#insufficient-input-validation-iot-int-inval-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
+- Based on [IOT-INT-INPV-001](#insufficient-input-validation-iot-int-inpv-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
**Remediation**
@@ -548,7 +550,7 @@ For this test case, data from the following sources was consolidated:
* ["Practical IoT Hacking"][practical_iot_hacking] by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inval-002).
+This test case is based on: [IOT-DES-INPV-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inpv-002).
diff --git a/src/03_test_cases/physical_interfaces/README.md b/src/03_test_cases/physical_interfaces/README.md
index f8ed688..1a7feea 100644
--- a/src/03_test_cases/physical_interfaces/README.md
+++ b/src/03_test_cases/physical_interfaces/README.md
@@ -1,26 +1,28 @@
# 3.6. Physical Interfaces (IOT-PHY)
## Table of Contents
-* [Overview](#overview)
-* [Authorization (IOT-PHY-AUTHZ)](#authorization-iot-phy-authz)
- * [Unauthorized Access to the Interface (IOT-PHY-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-phy-authz-001)
- * [Privilege Escalation (IOT-PHY-AUTHZ-002)](#privilege-escalation-iot-phy-authz-002)
-* [Information Gathering (IOT-PHY-INFO)](#information-gathering-iot-phy-info)
- * [Disclosure of Implementation Details (IOT-PHY-INFO-001)](#disclosure-of-implementation-details-iot-phy-info-001)
- * [Disclosure of Ecosystem Details (IOT-PHY-INFO-002)](#disclosure-of-ecosystem-details-iot-phy-info-002)
- * [Disclosure of User Data (IOT-PHY-INFO-003)](#disclosure-of-user-data-iot-phy-info-003)
-* [Configuration and Patch Management (IOT-PHY-CONF)](#configuration-and-patch-management-iot-phy-conf)
- * [Usage of Outdated Software (IOT-PHY-CONF-001)](#usage-of-outdated-software-iot-phy-conf-001)
- * [Presence of Unnecessary Software and Functionalities (IOT-PHY-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-phy-conf-002)
-* [Secrets (IOT-PHY-SCRT)](#secrets-iot-phy-scrt)
- * [Access to Confidential Data (IOT-PHY-SCRT-001)](#access-to-confidential-data-iot-phy-scrt-001)
-* [Cryptography (IOT-PHY-CRYPT)](#cryptography-iot-phy-crypt)
- * [Usage of Weak Cryptographic Algorithms (IOT-PHY-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-phy-crypt-001)
-* [Business Logic (IOT-PHY-LOGIC)](#business-logic-iot-phy-logic)
- * [Circumvention of the Intended Business Logic (IOT-PHY-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-phy-logic-001)
-* [Input Validation (IOT-PHY-INVAL)](#input-validation-iot-phy-inval)
- * [Insufficient Input Validation (IOT-PHY-INVAL-001)](#insufficient-input-validation-iot-phy-inval-001)
- * [Code or Command Injection (IOT-PHY-INVAL-002)](#code-or-command-injection-iot-phy-inval-002)
+- [3.6. Physical Interfaces (IOT-PHY)](#36-physical-interfaces-iot-phy)
+ - [Table of Contents](#table-of-contents)
+ - [Overview](#overview)
+ - [Authorization (IOT-PHY-AUTHZ)](#authorization-iot-phy-authz)
+ - [Unauthorized Access to the Interface (IOT-PHY-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-phy-authz-001)
+ - [Privilege Escalation (IOT-PHY-AUTHZ-002)](#privilege-escalation-iot-phy-authz-002)
+ - [Information Gathering (IOT-PHY-INFO)](#information-gathering-iot-phy-info)
+ - [Disclosure of Implementation Details (IOT-PHY-INFO-001)](#disclosure-of-implementation-details-iot-phy-info-001)
+ - [Disclosure of Ecosystem Details (IOT-PHY-INFO-002)](#disclosure-of-ecosystem-details-iot-phy-info-002)
+ - [Disclosure of User Data (IOT-PHY-INFO-003)](#disclosure-of-user-data-iot-phy-info-003)
+ - [Configuration and Patch Management (IOT-PHY-CONF)](#configuration-and-patch-management-iot-phy-conf)
+ - [Usage of Outdated Software (IOT-PHY-CONF-001)](#usage-of-outdated-software-iot-phy-conf-001)
+ - [Presence of Unnecessary Software and Functionalities (IOT-PHY-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-phy-conf-002)
+ - [Secrets (IOT-PHY-SCRT)](#secrets-iot-phy-scrt)
+ - [Access to Confidential Data (IOT-PHY-SCRT-001)](#access-to-confidential-data-iot-phy-scrt-001)
+ - [Cryptography (IOT-PHY-CRYPT)](#cryptography-iot-phy-crypt)
+ - [Usage of Weak Cryptographic Algorithms (IOT-PHY-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-phy-crypt-001)
+ - [Business Logic (IOT-PHY-LOGIC)](#business-logic-iot-phy-logic)
+ - [Circumvention of the Intended Business Logic (IOT-PHY-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-phy-logic-001)
+ - [Input Validation (IOT-PHY-INPV)](#input-validation-iot-phy-inpv)
+ - [Insufficient Input Validation (IOT-PHY-INPV-001)](#insufficient-input-validation-iot-phy-inpv-001)
+ - [Code or Command Injection (IOT-PHY-INPV-002)](#code-or-command-injection-iot-phy-inpv-002)
@@ -452,11 +454,11 @@ This test case is based on: [IOT-DES-LOGIC-001](../data_exchange_services/README
-## Input Validation (IOT-PHY-INVAL)
+## Input Validation (IOT-PHY-INPV)
In order to ensure that only valid and well-formed data enters the processing flows of a device, the input from a all untrustworthy sources, e.g., users or external systems, has to be verified and validated.
-### Insufficient Input Validation (IOT-PHY-INVAL-001)
+### Insufficient Input Validation (IOT-PHY-INPV-001)
**Required Access Levels**
@@ -490,9 +492,9 @@ For this test case, data from the following sources was consolidated:
* ["IoT Pentesting Guide"][iot_pentesting_guide] by Aditya Gupta
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inval-001).
+This test case is based on: [IOT-DES-INPV-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inpv-001).
-### Code or Command Injection (IOT-PHY-INVAL-002)
+### Code or Command Injection (IOT-PHY-INPV-002)
**Required Access Levels**
@@ -511,7 +513,7 @@ If no input validation is performed or only an insufficient input validation mec
**Test Objectives**
-- Based on [IOT-PHY-INVAL-001](#insufficient-input-validation-iot-phy-inval-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
+- Based on [IOT-PHY-INPV-001](#insufficient-input-validation-iot-phy-inpv-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
**Remediation**
@@ -524,7 +526,7 @@ For this test case, data from the following sources was consolidated:
* ["IoT Pentesting Guide"][iot_pentesting_guide] by Aditya Gupta
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inval-002).
+This test case is based on: [IOT-DES-INPV-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inpv-002).
diff --git a/src/03_test_cases/user_interfaces/README.md b/src/03_test_cases/user_interfaces/README.md
index 19d9cf9..7540808 100644
--- a/src/03_test_cases/user_interfaces/README.md
+++ b/src/03_test_cases/user_interfaces/README.md
@@ -1,26 +1,28 @@
# 3.8. User Interfaces (IOT-UI)
## Table of Contents
-* [Overview](#overview)
-* [Authorization (IOT-UI-AUTHZ)](#authorization-iot-ui-authz)
- * [Unauthorized Access to the Interface (IOT-UI-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-ui-authz-001)
- * [Privilege Escalation (IOT-UI-AUTHZ-002)](#privilege-escalation-iot-ui-authz-002)
-* [Information Gathering (IOT-UI-INFO)](#information-gathering-iot-ui-info)
- * [Disclosure of Implementation Details (IOT-UI-INFO-001)](#disclosure-of-implementation-details-iot-ui-info-001)
- * [Disclosure of Ecosystem Details (IOT-UI-INFO-002)](#disclosure-of-ecosystem-details-iot-ui-info-002)
- * [Disclosure of User Data (IOT-UI-INFO-003)](#disclosure-of-user-data-iot-ui-info-003)
-* [Configuration and Patch Management (IOT-UI-CONF)](#configuration-and-patch-management-iot-ui-conf)
- * [Usage of Outdated Software (IOT-UI-CONF-001)](#usage-of-outdated-software-iot-ui-conf-001)
- * [Presence of Unnecessary Software and Functionalities (IOT-UI-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-ui-conf-002)
-* [Secrets (IOT-UI-SCRT)](#secrets-iot-ui-scrt)
- * [Access to Confidential Data (IOT-UI-SCRT-001)](#access-to-confidential-data-iot-ui-scrt-001)
-* [Cryptography (IOT-UI-CRYPT)](#cryptography-iot-ui-crypt)
- * [Usage of Weak Cryptographic Algorithms (IOT-UI-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-ui-crypt-001)
-* [Business Logic (IOT-UI-LOGIC)](#business-logic-iot-ui-logic)
- * [Circumvention of the Intended Business Logic (IOT-UI-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-ui-logic-001)
-* [Input Validation (IOT-UI-INVAL)](#input-validation-iot-ui-inval)
- * [Insufficient Input Validation (IOT-UI-INVAL-001)](#insufficient-input-validation-iot-ui-inval-001)
- * [Code or Command Injection (IOT-UI-INVAL-002)](#code-or-command-injection-iot-ui-inval-002)
+- [3.8. User Interfaces (IOT-UI)](#38-user-interfaces-iot-ui)
+ - [Table of Contents](#table-of-contents)
+ - [Overview](#overview)
+ - [Authorization (IOT-UI-AUTHZ)](#authorization-iot-ui-authz)
+ - [Unauthorized Access to the Interface (IOT-UI-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-ui-authz-001)
+ - [Privilege Escalation (IOT-UI-AUTHZ-002)](#privilege-escalation-iot-ui-authz-002)
+ - [Information Gathering (IOT-UI-INFO)](#information-gathering-iot-ui-info)
+ - [Disclosure of Implementation Details (IOT-UI-INFO-001)](#disclosure-of-implementation-details-iot-ui-info-001)
+ - [Disclosure of Ecosystem Details (IOT-UI-INFO-002)](#disclosure-of-ecosystem-details-iot-ui-info-002)
+ - [Disclosure of User Data (IOT-UI-INFO-003)](#disclosure-of-user-data-iot-ui-info-003)
+ - [Configuration and Patch Management (IOT-UI-CONF)](#configuration-and-patch-management-iot-ui-conf)
+ - [Usage of Outdated Software (IOT-UI-CONF-001)](#usage-of-outdated-software-iot-ui-conf-001)
+ - [Presence of Unnecessary Software and Functionalities (IOT-UI-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-ui-conf-002)
+ - [Secrets (IOT-UI-SCRT)](#secrets-iot-ui-scrt)
+ - [Access to Confidential Data (IOT-UI-SCRT-001)](#access-to-confidential-data-iot-ui-scrt-001)
+ - [Cryptography (IOT-UI-CRYPT)](#cryptography-iot-ui-crypt)
+ - [Usage of Weak Cryptographic Algorithms (IOT-UI-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-ui-crypt-001)
+ - [Business Logic (IOT-UI-LOGIC)](#business-logic-iot-ui-logic)
+ - [Circumvention of the Intended Business Logic (IOT-UI-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-ui-logic-001)
+ - [Input Validation (IOT-UI-INPV)](#input-validation-iot-ui-inpv)
+ - [Insufficient Input Validation (IOT-UI-INPV-001)](#insufficient-input-validation-iot-ui-inpv-001)
+ - [Code or Command Injection (IOT-UI-INPV-002)](#code-or-command-injection-iot-ui-inpv-002)
@@ -478,11 +480,11 @@ This test case is based on: [IOT-DES-LOGIC-001](../data_exchange_services/README
-## Input Validation (IOT-UI-INVAL)
+## Input Validation (IOT-UI-INPV)
In order to ensure that only valid and well-formed data enters the processing flows of a device, the input from a all untrustworthy sources, e.g., users or external systems, has to be verified and validated.
-### Insufficient Input Validation (IOT-UI-INVAL-001)
+### Insufficient Input Validation (IOT-UI-INPV-001)
**Required Access Levels**
@@ -520,9 +522,9 @@ For this test case, data from the following sources was consolidated:
* ["Practical IoT Hacking"][practical_iot_hacking] by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inval-001).
+This test case is based on: [IOT-DES-INPV-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inpv-001).
-### Code or Command Injection (IOT-UI-INVAL-002)
+### Code or Command Injection (IOT-UI-INPV-002)
**Required Access Levels**
@@ -541,7 +543,7 @@ If no input validation is performed or only an insufficient input validation mec
**Test Objectives**
-- Based on [IOT-UI-INVAL-001](#insufficient-input-validation-iot-ui-inval-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
+- Based on [IOT-UI-INPV-001](#insufficient-input-validation-iot-ui-inpv-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
**Remediation**
@@ -558,7 +560,7 @@ For this test case, data from the following sources was consolidated:
* ["Practical IoT Hacking"][practical_iot_hacking] by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inval-002).
+This test case is based on: [IOT-DES-INPV-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inpv-002).
diff --git a/src/03_test_cases/wireless_interfaces/README.md b/src/03_test_cases/wireless_interfaces/README.md
index a0bb7d0..9507406 100644
--- a/src/03_test_cases/wireless_interfaces/README.md
+++ b/src/03_test_cases/wireless_interfaces/README.md
@@ -1,26 +1,28 @@
# 3.7. Wireless Interfaces (IOT-WRLS)
## Table of Contents
-* [Overview](#overview)
-* [Authorization (IOT-WRLS-AUTHZ)](#authorization-iot-wrls-authz)
- * [Unauthorized Access to the Interface (IOT-WRLS-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-wrls-authz-001)
- * [Privilege Escalation (IOT-WRLS-AUTHZ-002)](#privilege-escalation-iot-wrls-authz-002)
-* [Information Gathering (IOT-WRLS-INFO)](#information-gathering-iot-wrls-info)
- * [Disclosure of Implementation Details (IOT-WRLS-INFO-001)](#disclosure-of-implementation-details-iot-wrls-info-001)
- * [Disclosure of Ecosystem Details (IOT-WRLS-INFO-002)](#disclosure-of-ecosystem-details-iot-wrls-info-002)
- * [Disclosure of User Data (IOT-WRLS-INFO-003)](#disclosure-of-user-data-iot-wrls-info-003)
-* [Configuration and Patch Management (IOT-WRLS-CONF)](#configuration-and-patch-management-iot-wrls-conf)
- * [Usage of Outdated Software (IOT-WRLS-CONF-001)](#usage-of-outdated-software-iot-wrls-conf-001)
- * [Presence of Unnecessary Software and Functionalities (IOT-WRLS-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-wrls-conf-002)
-* [Secrets (IOT-WRLS-SCRT)](#secrets-iot-wrls-scrt)
- * [Access to Confidential Data (IOT-WRLS-SCRT-001)](#access-to-confidential-data-iot-wrls-scrt-001)
-* [Cryptography (IOT-WRLS-CRYPT)](#cryptography-iot-wrls-crypt)
- * [Usage of Weak Cryptographic Algorithms (IOT-WRLS-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-wrls-crypt-001)
-* [Business Logic (IOT-WRLS-LOGIC)](#business-logic-iot-wrls-logic)
- * [Circumvention of the Intended Business Logic (IOT-WRLS-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-wrls-logic-001)
-* [Input Validation (IOT-WRLS-INVAL)](#input-validation-iot-wrls-inval)
- * [Insufficient Input Validation (IOT-WRLS-INVAL-001)](#insufficient-input-validation-iot-wrls-inval-001)
- * [Code or Command Injection (IOT-WRLS-INVAL-002)](#code-or-command-injection-iot-wrls-inval-002)
+- [3.7. Wireless Interfaces (IOT-WRLS)](#37-wireless-interfaces-iot-wrls)
+ - [Table of Contents](#table-of-contents)
+ - [Overview](#overview)
+ - [Authorization (IOT-WRLS-AUTHZ)](#authorization-iot-wrls-authz)
+ - [Unauthorized Access to the Interface (IOT-WRLS-AUTHZ-001)](#unauthorized-access-to-the-interface-iot-wrls-authz-001)
+ - [Privilege Escalation (IOT-WRLS-AUTHZ-002)](#privilege-escalation-iot-wrls-authz-002)
+ - [Information Gathering (IOT-WRLS-INFO)](#information-gathering-iot-wrls-info)
+ - [Disclosure of Implementation Details (IOT-WRLS-INFO-001)](#disclosure-of-implementation-details-iot-wrls-info-001)
+ - [Disclosure of Ecosystem Details (IOT-WRLS-INFO-002)](#disclosure-of-ecosystem-details-iot-wrls-info-002)
+ - [Disclosure of User Data (IOT-WRLS-INFO-003)](#disclosure-of-user-data-iot-wrls-info-003)
+ - [Configuration and Patch Management (IOT-WRLS-CONF)](#configuration-and-patch-management-iot-wrls-conf)
+ - [Usage of Outdated Software (IOT-WRLS-CONF-001)](#usage-of-outdated-software-iot-wrls-conf-001)
+ - [Presence of Unnecessary Software and Functionalities (IOT-WRLS-CONF-002)](#presence-of-unnecessary-software-and-functionalities-iot-wrls-conf-002)
+ - [Secrets (IOT-WRLS-SCRT)](#secrets-iot-wrls-scrt)
+ - [Access to Confidential Data (IOT-WRLS-SCRT-001)](#access-to-confidential-data-iot-wrls-scrt-001)
+ - [Cryptography (IOT-WRLS-CRYPT)](#cryptography-iot-wrls-crypt)
+ - [Usage of Weak Cryptographic Algorithms (IOT-WRLS-CRYPT-001)](#usage-of-weak-cryptographic-algorithms-iot-wrls-crypt-001)
+ - [Business Logic (IOT-WRLS-LOGIC)](#business-logic-iot-wrls-logic)
+ - [Circumvention of the Intended Business Logic (IOT-WRLS-LOGIC-001)](#circumvention-of-the-intended-business-logic-iot-wrls-logic-001)
+ - [Input Validation (IOT-WRLS-INPV)](#input-validation-iot-wrls-inpv)
+ - [Insufficient Input Validation (IOT-WRLS-INPV-001)](#insufficient-input-validation-iot-wrls-inpv-001)
+ - [Code or Command Injection (IOT-WRLS-INPV-002)](#code-or-command-injection-iot-wrls-inpv-002)
@@ -480,11 +482,11 @@ This test case is based on: [IOT-DES-LOGIC-001](../data_exchange_services/README
-## Input Validation (IOT-WRLS-INVAL)
+## Input Validation (IOT-WRLS-INPV)
In order to ensure that only valid and well-formed data enters the processing flows of a device, the input from a all untrustworthy sources, e.g., users or external systems, has to be verified and validated.
-### Insufficient Input Validation (IOT-WRLS-INVAL-001)
+### Insufficient Input Validation (IOT-WRLS-INPV-001)
**Required Access Levels**
@@ -521,9 +523,9 @@ For this test case, data from the following sources was consolidated:
* ["Practical IoT Hacking"][practical_iot_hacking] by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inval-001).
+This test case is based on: [IOT-DES-INPV-001](../data_exchange_services/README.md#insufficient-input-validation-iot-des-inpv-001).
-### Code or Command Injection (IOT-WRLS-INVAL-002)
+### Code or Command Injection (IOT-WRLS-INPV-002)
**Required Access Levels**
@@ -542,7 +544,7 @@ If no input validation is performed or only an insufficient input validation mec
**Test Objectives**
-- Based on [IOT-WRLS-INVAL-001](#insufficient-input-validation-iot-wrls-inval-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
+- Based on [IOT-WRLS-INPV-001](#insufficient-input-validation-iot-wrls-inpv-001), it must be checked whether it is possible to submit code or commands, which are then executed by the system.
**Remediation**
@@ -558,7 +560,7 @@ For this test case, data from the following sources was consolidated:
* ["Practical IoT Hacking"][practical_iot_hacking] by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods
* Key aspects of testing of the T-Systems Multimedia Solutions GmbH
-This test case is based on: [IOT-DES-INVAL-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inval-002).
+This test case is based on: [IOT-DES-INPV-002](../data_exchange_services/README.md#code-or-command-injection-iot-des-inpv-002).