9.8
CRITICAL
CVE-2023-24855
Cisco Modem Remote Code Execution Vulnerability
Description

Memory corruption in Modem while processing security related configuration before AS Security Exchange.

INFO

Published Date :

Oct. 3, 2023, 6:15 a.m.

Last Modified :

April 12, 2024, 5:17 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2023-24855 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6391_firmware
2 Qualcomm wcd9380_firmware
3 Qualcomm wcd9385_firmware
4 Qualcomm wcn3988_firmware
5 Qualcomm wsa8810_firmware
6 Qualcomm wsa8815_firmware
7 Qualcomm wsa8830_firmware
8 Qualcomm wsa8835_firmware
9 Qualcomm ar8035_firmware
10 Qualcomm qca8081_firmware
11 Qualcomm qca8337_firmware
12 Qualcomm qcm4490_firmware
13 Qualcomm qcm6490_firmware
14 Qualcomm qcn6024_firmware
15 Qualcomm qcn9024_firmware
16 Qualcomm qcs4490_firmware
17 Qualcomm qcs6490_firmware
18 Qualcomm sm7325p_firmware
19 Qualcomm sm4350-ac_firmware
20 Qualcomm sm7325-ae_firmware
21 Qualcomm sm7325-af_firmware
22 Qualcomm snapdragon_7c\+_gen_3_compute_firmware
23 Qualcomm sm8350-ac_firmware
24 Qualcomm snapdragon_x65_5g_modem-rf_system_firmware
25 Qualcomm wcd9340_firmware
26 Qualcomm wcd9370_firmware
27 Qualcomm wcd9375_firmware
28 Qualcomm wcn3950_firmware
29 Qualcomm wcn6740_firmware
30 Qualcomm wsa8832_firmware
31 Qualcomm sdx57m_firmware
32 Qualcomm fastconnect_6200_firmware
33 Qualcomm fastconnect_6900_firmware
34 Qualcomm fastconnect_7800_firmware
35 Qualcomm fastconnect_6700_firmware
36 Qualcomm snapdragon_4_gen_1_mobile_platform_firmware
37 Qualcomm snapdragon_480_5g_mobile_platform_firmware
38 Qualcomm snapdragon_695_5g_mobile_platform_firmware
39 Qualcomm snapdragon_778g_5g_mobile_platform_firmware
40 Qualcomm snapdragon_780g_5g_mobile_platform_firmware
41 Qualcomm snapdragon_8_gen_1_mobile_platform_firmware
42 Qualcomm snapdragon_8\+_gen_1_mobile_platform_firmware
43 Qualcomm snapdragon_888_5g_mobile_platform_firmware
44 Qualcomm qcs8550_firmware
45 Qualcomm qcc710_firmware
46 Qualcomm snapdragon_x70_modem-rf_system_firmware
47 Qualcomm qcm8550_firmware
48 Qualcomm qualcomm_video_collaboration_vc3_platform_firmware
49 Qualcomm sm8550p_firmware
50 Qualcomm snapdragon_4_gen_2_mobile_platform_firmware
51 Qualcomm snapdragon_8_gen_2_mobile_platform_firmware
52 Qualcomm snapdragon_8\+_gen_2_mobile_platform_firmware
53 Qualcomm wcd9390_firmware
54 Qualcomm wcd9395_firmware
55 Qualcomm wsa8840_firmware
56 Qualcomm wsa8845_firmware
57 Qualcomm wsa8845h_firmware
58 Qualcomm sg8275p_firmware
59 Qualcomm qcn6224_firmware
60 Qualcomm qcn6274_firmware
61 Qualcomm qfw7114_firmware
62 Qualcomm qfw7124_firmware
63 Qualcomm snapdragon_x75_5g_modem-rf_system_firmware
64 Qualcomm ar8035
65 Qualcomm qca6391
66 Qualcomm wcd9340
67 Qualcomm wcd9370
68 Qualcomm wcd9375
69 Qualcomm wcd9380
70 Qualcomm wcd9385
71 Qualcomm wcn3950
72 Qualcomm wcn3988
73 Qualcomm wcn6740
74 Qualcomm wsa8810
75 Qualcomm wsa8815
76 Qualcomm wsa8830
77 Qualcomm wsa8835
78 Qualcomm qca8337
79 Qualcomm qca8081
80 Qualcomm qcn6024
81 Qualcomm qcn9024
82 Qualcomm fastconnect_6700
83 Qualcomm fastconnect_6200
84 Qualcomm fastconnect_6900
85 Qualcomm qcs6490
86 Qualcomm qualcomm_video_collaboration_vc3_platform
87 Qualcomm fastconnect_7800
88 Qualcomm qcc710
89 Qualcomm qcn6224
90 Qualcomm qcn6274
91 Qualcomm qfw7114
92 Qualcomm qfw7124
93 Qualcomm snapdragon_x75_5g_modem-rf_system
94 Qualcomm qcm4490
95 Qualcomm qcm6490
96 Qualcomm qcm8550
97 Qualcomm qcs4490
98 Qualcomm qcs8550
99 Qualcomm sg8275p
100 Qualcomm sm7325p
101 Qualcomm sm8550p
102 Qualcomm snapdragon_4_gen_1_mobile_platform
103 Qualcomm snapdragon_4_gen_2_mobile_platform
104 Qualcomm snapdragon_480_5g_mobile_platform
105 Qualcomm snapdragon_695_5g_mobile_platform
106 Qualcomm snapdragon_778g_5g_mobile_platform
107 Qualcomm snapdragon_780g_5g_mobile_platform
108 Qualcomm snapdragon_7c\+_gen_3_compute
109 Qualcomm snapdragon_8_gen_1_mobile_platform
110 Qualcomm snapdragon_8_gen_2_mobile_platform
111 Qualcomm snapdragon_8\+_gen_1_mobile_platform
112 Qualcomm snapdragon_8\+_gen_2_mobile_platform
113 Qualcomm snapdragon_888_5g_mobile_platform
114 Qualcomm snapdragon_x65_5g_modem-rf_system
115 Qualcomm wcd9390
116 Qualcomm wcd9395
117 Qualcomm wsa8832
118 Qualcomm wsa8840
119 Qualcomm wsa8845
120 Qualcomm wsa8845h
121 Qualcomm sdx57m
122 Qualcomm snapdragon_x70_modem-rf_system
123 Qualcomm sm4350-ac
124 Qualcomm sm7325-ae
125 Qualcomm sm7325-af
126 Qualcomm sm8350-ac
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-24855.

URL Resource
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-24855 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-24855 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 12, 2024

    Action Type Old Value New Value
    Added CWE Qualcomm, Inc. CWE-823
  • Initial Analysis by [email protected]

    Oct. 04, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin No Types Assigned https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin Vendor Advisory
    Added CWE NIST CWE-787
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm4350-ac_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm4350-ac:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7325-ae_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7325-ae:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7325-af_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7325-af:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_7c\+_gen_3_compute_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_7c\+_gen_3_compute:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8\+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8\+_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8350-ac_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8350-ac:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-24855 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-24855 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.09 }} 0.01%

score

0.39060

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability