Modes Of Introduction
Implementation : Keys, code, configuration settings, and other data should be programmed in write-once or read-only memory instead of writable memory.
Applicable Platforms
Language
Class: Not Language-Specific (Undetermined)
Operating Systems
Class: Not OS-Specific (Undetermined)
Architectures
Class: Not Architecture-Specific (Undetermined)
Technologies
Class: Not Technology-Specific (Undetermined)
Common Consequences
Scope |
Impact |
Likelihood |
Integrity | Varies by Context | |
Potential Mitigations
Phases : Implementation
All immutable code or data should be programmed into ROM or write-once memory.
Vulnerability Mapping Notes
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Related Attack Patterns
CAPEC-ID |
Attack Pattern Name |
CAPEC-458 |
Flash Memory Attacks An adversary inserts malicious logic into a product or technology via flashing the on-board memory with a code-base that contains malicious logic. Various attacks exist against the integrity of flash memory, the most direct being rootkits coded into the BIOS or chipset of a device. |
CAPEC-679 |
Exploitation of Improperly Configured or Implemented Memory Protections
An adversary takes advantage of missing or incorrectly configured access control within memory to read/write data or inject malicious code into said memory.
|
NotesNotes
This entry is still under development and will continue to
see updates and content improvements.
As of CWE 4.3, CWE-1282 and CWE-1233 are being investigated
for potential duplication or overlap.
Submission
Name |
Organization |
Date |
Date release |
Version |
Nicole Fern |
Cycuity (originally submitted as Tortuga Logic) |
2020-05-15 +00:00 |
2020-02-24 +00:00 |
4.1 |
Modifications
Name |
Organization |
Date |
Comment |
CWE Content Team |
MITRE |
2020-08-20 +00:00 |
updated Demonstrative_Examples, Description, Modes_of_Introduction, Name |
CWE Content Team |
MITRE |
2021-03-15 +00:00 |
updated Maintenance_Notes |
CWE Content Team |
MITRE |
2021-07-20 +00:00 |
updated Related_Attack_Patterns |
CWE Content Team |
MITRE |
2022-04-28 +00:00 |
updated Related_Attack_Patterns |
CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Related_Attack_Patterns |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |