Mitigation-page

MID-025: End-of-Life Management Features

Mitigation Tier: Leading

Description

When vendor-provided device maintenance stops, devices that may contain vulnerabilities are left unsupported and unpatched. Any vulnerability found during this time may be present in a device for as long as that device continues to be used. By allowing device users to perform end-of-life management, device users to optionally attempt to maintain a higher security posture on their device through third-party firmware updates or security software. For this to be possible, the device vendor may have to include technical controls, such as “unlocking” parts of the device through a final firmware update or distribution of keys or allowing device users to upload their own keys for use in functions like firmware update mechanisms and secure boot processes. Additionally, the device vendor will likely have to update their device usage terms of service to include statements that once an end-of-life determination is made, certain liability mechanisms and warranties are no longer applicable.

Limitations: Giving device users access to device management tools that are typically reserved for vendors, such as firmware updates, may open up threat vectors for threat actors.

IEC 62443 4-2 Mappings

  • none

References

[1] RedHat. “Chapter 3. Signing a kernel and modules for Secure Boot.” redhat.com. Accessed: Aug. 28, 2024. [Online.] Available: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/managing_monitoring_and_updating_the_kernel/signing-a-kernel-and-modules-for-secure-boot_managing-monitoring-and-updating-the-kernel

[2] H. Mbugua, A. Buck, C. Werner, J. Flores, B. Lamos, C. Wales, B. de Koning, F. Ombongi, M. Macy, A. Cornelissen, B. Braig, C. Chiedo. “Create a self-signed public certificate to authenticate to your application.” microsoft.com. Accessed: Aug. 28, 2024. [Online.] Available: https://learn.microsoft.com/en-us/entra/identity-platform/howto-create-self-signed-certificate

[3] Android. “Lock and unlock the bootloader.” android.com. Accessed: Aug. 28, 2024. [Online.] Available: https://source.android.com/docs/core/architecture/bootloader/locking_unlocking

[4] B. Schoon. “LG is closing the bootloader unlock program that would help keep its Android phones alive.” 9to5google.com. Accessed: Aug. 28, 2024. [Online.] Available: https://9to5google.com/2021/12/06/lg-bootloader-unlock-program-closing/

[5] D. Wallach. “Assured Micropatching (AMP).” darpa.mil. Accessed: Aug. 28, 2024. [Online.] Available: https://www.darpa.mil/program/assured-micropatching