A System or System-on-Chip (SoC) that implements a boot process utilizing security mechanisms such as Root-of-Trust (RoT) typically starts by executing code from a Read-only-Memory (ROM) component. The code in ROM is immutable, hence any security vulnerabilities discovered in the ROM code can never be fixed for the systems that are already in use.
A common weakness is that the ROM does not have the ability to patch if security vulnerabilities are uncovered after the system gets shipped. This leaves the system in a vulnerable state where an adversary can compromise the SoC.
Portée | Impact | Probabilité |
---|---|---|
Other | Varies by Context, Reduce Maintainability Note: When the system is unable to be patched, it can be left in a vulnerable state. | High |
CAPEC-ID | Nom du modèle d'attaque |
---|---|
CAPEC-682 | Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities An adversary may exploit vulnerable code (i.e., firmware or ROM) that is unpatchable. Unpatchable devices exist due to manufacturers intentionally or inadvertently designing devices incapable of updating their software. Additionally, with updatable devices, the manufacturer may decide not to support the device and stop making updates to their software. |
Nom | Organisation | Date | Date de publication | Version |
---|---|---|---|---|
Narasimha Kumar V Mangipudi | Intel Corporation | 4.3 |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CWE Content Team | MITRE | updated Maintenance_Notes | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Maintenance_Notes | |
CWE Content Team | MITRE | updated Applicable_Platforms, Common_Consequences, Potential_Mitigations, Relationships | |
CWE Content Team | MITRE | updated References, Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Demonstrative_Examples, References |