Modes Of Introduction
Architecture and Design
Implementation
Applicable Platforms
Language
Class: Not Language-Specific (Undetermined)
Operating Systems
Class: Not OS-Specific (Undetermined)
Architectures
Class: Not Architecture-Specific (Undetermined)
Technologies
Class: System on Chip (Undetermined)
Name: Memory Hardware (Undetermined)
Name: Storage Hardware (Undetermined)
Common Consequences
Scope |
Impact |
Likelihood |
Availability | DoS: Instability | |
Potential Mitigations
Phases : Architecture and Design // Implementation // Testing
Include secure wear leveling algorithms and ensure they may not be bypassed.
Vulnerability Mapping Notes
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Related Attack Patterns
CAPEC-ID |
Attack Pattern Name |
CAPEC-212 |
Functionality Misuse An adversary leverages a legitimate capability of an application in such a way as to achieve a negative technical impact. The system functionality is not altered or modified but used in a way that was not intended. This is often accomplished through the overuse of a specific functionality or by leveraging functionality with design flaws that enables the adversary to gain access to unauthorized, sensitive data. |
References
REF-1058
Enhancing Lifetime and Security of PCM-Based Main Memory with Start-Gap Wear Leveling
Moinuddin Qureshi, Michele Franchescini, Vijayalakshmi Srinivasan, Luis Lastras, Bulent Abali, John Karidis.
https://researcher.watson.ibm.com/researcher/files/us-moinqureshi/papers-sgap.pdf REF-1059
Bad Block Management in NAND Flash Memory
Micron.
https://www.micron.com/-/media/client/global/documents/products/technical-note/nand-flash/tn2959_bbm_in_nand_flash.pdf
Submission
Name |
Organization |
Date |
Date release |
Version |
Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi |
Intel Corporation |
2020-02-10 +00:00 |
2020-02-24 +00:00 |
4.0 |
Modifications
Name |
Organization |
Date |
Comment |
CWE Content Team |
MITRE |
2020-08-20 +00:00 |
updated Demonstrative_Examples, Description, Potential_Mitigations, Research_Gaps |
CWE Content Team |
MITRE |
2021-07-20 +00:00 |
updated Related_Attack_Patterns |
CWE Content Team |
MITRE |
2022-04-28 +00:00 |
updated Applicable_Platforms |
CWE Content Team |
MITRE |
2022-06-28 +00:00 |
updated Applicable_Platforms |
CWE Content Team |
MITRE |
2022-10-13 +00:00 |
updated Demonstrative_Examples, Relationships, Research_Gaps |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated References, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |