An adversary takes advantage of missing or incorrectly configured access control within memory to read/write data or inject malicious code into said memory.
Weakness Name | |
---|---|
CWE-1222 |
Insufficient Granularity of Address Regions Protected by Register Locks The product defines a large address region protected from modification by the same register lock control bit. This results in a conflict between the functional requirement that some addresses need to be writable by software during operation and the security requirement that the system configuration lock bit must be set during the boot process. |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations The CPU is not configured to provide hardware support for exclusivity of write and execute operations on memory. This allows an attacker to execute data from all of memory. |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions Aliased or mirrored memory regions in hardware designs may have inconsistent read/write permissions enforced by the hardware. A possible result is that an untrusted agent is blocked from accessing a memory region but is not blocked from accessing the corresponding aliased memory region. |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges The product allows address regions to overlap, which can result in the bypassing of intended memory protection. |
CWE-1274 |
Improper Access Control for Volatile Memory Containing Boot Code The product conducts a secure-boot process that transfers bootloader code from Non-Volatile Memory (NVM) into Volatile Memory (VM), but it does not have sufficient access control or other protections for the Volatile Memory. |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory Immutable data, such as a first-stage bootloader, device identifiers, and "write-once" configuration settings are stored in writable memory that can be re-programmed or updated in the field. |
CWE-1312 |
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall The firewall in an on-chip fabric protects the main addressed region, but it does not protect any mirrored memory or memory-mapped-IO (MMIO) regions. |
CWE-1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges The address map of the on-chip fabric has protected and unprotected regions overlapping, allowing an attacker to bypass access control to the overlapping portion of the protected region. |
CWE-1326 |
Missing Immutable Root of Trust in Hardware A missing immutable root of trust in the hardware results in the ability to bypass secure boot or execute untrusted or adversarial boot code. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |