CAPEC-681: Exploitation of Improperly Controlled Hardware Security Identifiers

ID CAPEC-681
Typical Severity Very High
Likelihood Of Attack Medium
Status Draft

An adversary takes advantage of missing or incorrectly configured security identifiers (e.g., tokens), which are used for access control within a System-on-Chip (SoC), to read/write data or execute a given action.

A System-on-Chip (SoC) often implements a security identifier mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, these mechanisms may be exploitable due to any number of the following:

  • The security identifiers are missing
  • The security identifiers are incorrectly implemented or generated
  • The security identifiers are generated with an obsolete encoding
  • The security identifiers are generated and implemented correctly, but are improperly protected

If the security identifiers leveraged by the SoC are missing or misconfigured, an adversary may be able to take advantage of this shortcoming to circumvent the intended access controls. This could result in the adversary gaining unintended access, performing a Denial of Service (DoS), escalating privileges, or spoofing actions from a trusted agent.

https://capec.mitre.org/data/definitions/681.html

Weaknesses

# ID Name Type
CWE-1259 Improper Restriction of Security Token Assignment weakness
CWE-1267 Policy Uses Obsolete Encoding weakness
CWE-1270 Generation of Incorrect Security Tokens weakness
CWE-1294 Insecure Security Identifier Mechanism weakness
CWE-1302 Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC) weakness
Loading...