Test 1-3
TEST 1 – BIS-2.5.1
Test Name: TC_VALIDATE_FIRMWARE_SOFTWARE_BILL_OF_MATERIALS_FACT Clause: 2.5 – Validate Firmware Software Bill of Materials
Objective:
Verification of the submitted list of third-party components by running automated tools like FACT (Framework for Analysis of COTS) on the firmware image.
Tools Used:
FACT (Framework for Analysis of COTS)
Firmware image as provided by OEM
Test Execution Steps:
Acquired the Software Bill of Materials (SBOM) from the vendor listing all third-party components and their versions.
Loaded the DUT firmware image into the FACT tool.
Ran automated analysis to extract actual component metadata embedded in the firmware (e.g., libraries, binaries, kernel modules).
Cross-referenced extracted data against the vendor-provided SBOM.
Verified component versioning, licensing info, and the presence of known CVEs using FACT’s internal vulnerability database.
Expected Results for Pass:
The FACT tool output confirms all third-party components and their versions match the submitted SBOM.
No unknown or undocumented components are found.
No discrepancies in versioning or licensing details.
Test Observations:
(To be filled post-execution – e.g., "All components matched with the submitted SBOM. No undocumented or vulnerable components found.")
Evidence Provided:
FACT scan report (PDF/JSON)
Firmware image hash: (insert SHA-256 here)
SBOM (as provided by OEM)
Test Case Result:
(To be filled post-validation – e.g., PASS / FAIL)
TEST 2 – BIS-2.5.2
Test Name: TC_VALIDATE_FIRMWARE_SOFTWARE_BILL_OF_MATERIALS_ID Clause: 2.5 – Validate Firmware Software Bill of Materials
Objective:
Identifying vulnerabilities in the third-party component(s) used within the firmware through publicly available vulnerability databases.
Tools Used:
NVD (National Vulnerability Database)
CVE database
Nessus vulnerability scanner
Test Execution Steps:
Collected the list of third-party components from the vendor-provided SBOM.
Queried public vulnerability databases such as NVD and CVE Details using the component names and versions.
Scanned the DUT firmware using Nessus to validate the presence and exposure of any known vulnerabilities.
Cross-referenced findings from both Nessus and the CVE database to eliminate false positives and ensure accuracy.
Documented each identified vulnerability along with:
CVE ID
Severity score (CVSS)
Potential impact
Affected component/version
Expected Results for Pass:
A detailed report listing all known vulnerabilities associated with the third-party components in the firmware.
The report includes severity levels and helps the vendor prioritize patching.
Test Observations:
Total vulnerabilities found: 15
Critical: 1
High: 5
Medium: 8
Low: 1
Vulnerabilities were identified through the CVE database, cross-verified with Nessus scan results.
Evidence Provided:
CVE reference list with severity breakdown
Nessus scan report
SBOM (provided by OEM)
Firmware image hash: (insert SHA-256 if applicable)
Test Case Result:
PASS – Vulnerabilities were successfully identified and reported based on the current version of third-party components.
TEST 3 – BIS-2.5.3
Test Name: TC_VALIDATE_FIRMWARE_SOFTWARE_BILL_OF_MATERIALS_PROCESS Clause: 2.5 – Validate Firmware Software Bill of Materials
Objective:
Verification and validation of the process defined by the vendor for providing regular security updates and patches for the firmware to address any known vulnerabilities in third-party components.
Tools Used:
Vendor-provided patch management policy and SOPs
Firmware version history and changelogs
Public release notes / advisory portal (if applicable)
Test Execution Steps:
Reviewed documentation provided by the vendor outlining:
Patch management policy
Security update lifecycle
Timeline and frequency of updates
Notification mechanism for customers
Validated process by reviewing historical records of:
Security advisories issued
Firmware patch release dates
CVEs addressed in past updates
Confirmed customer communication system such as:
Email notification for vulnerabilities and patches
Release notes on portal or support site
SLA (Service Level Agreement) for patch delivery timelines
Expected Results for Pass:
The vendor follows a well-defined, consistent process to identify, patch, and notify users of third-party vulnerabilities.
Timely release of updates and clear customer communication are in place.
Test Observations:
The vendor maintains an internal vulnerability tracking system mapped to CVE IDs.
Firmware releases include release notes referencing CVEs fixed.
Updates for critical and high-severity vulnerabilities are typically released within 30 days.
Customers are informed via email bulletins and updates posted to the support portal.
Test Case Result:
PASS
Overall Test Result:
PASS
Last updated
Was this helpful?