An adversary exploits missing or incorrectly configured access control within registers to read/write data that is not meant to be obtained or modified by a user.
Weakness Name | |
---|---|
CWE-1224 |
Improper Restriction of Write-Once Bit Fields The hardware design control register "sticky bits" or write-once bit fields are improperly implemented, such that they can be reprogrammed by software. |
CWE-1231 |
Improper Prevention of Lock Bit Modification The product uses a trusted lock bit for restricting access to registers, address regions, or other resources, but the product does not prevent the value of the lock bit from being modified after it has been set. |
CWE-1233 |
Security-Sensitive Hardware Controls with Missing Lock Bit Protection The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware system configuration. |
CWE-1262 |
Improper Access Control for Register Interface The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers. |
CWE-1283 |
Mutable Attestation or Measurement Reporting Data The register contents used for attestation or measurement reporting data to verify boot flow are modifiable by an adversary. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |