LOW
This scenario does not describe a direct vulnerability or exploit. However, the lack of documentation poses an indirect risk to network integrity and maintenance. The severity is LOW as it primarily impacts operational efficiency rather than security.

The scenario describes a lack of network documentation and cable labeling, leading to difficulties in identifying the mappings between wall drops and switch ports. No specific vulnerability or attack vector is mentioned, but proper documentation and cable management are crucial for maintaining security and operational efficiency.

Affected Systems
  • network infrastructure
Remediation
  • Label all cables with a permanent marker or cable labels indicating their destination and switch port number.
  • Create a physical map of the network layout, noting which wall drops correspond to which rooms and switch ports.
  • Use a cable tester to verify connectivity and ensure that there are no breaks in the cabling.
  • Document all findings in a centralized location accessible to IT staff.
Source →