CWE-1193: Power-On of Untrusted Execution Core Before Enabling Fabric Access Control

ID CWE-1193
Abstraction Base
Structure Simple
Status Draft
The product enables components that contain untrusted firmware before memory and fabric access controls have been enabled.

After initial reset, System-on-Chip (SoC) fabric access controls and other security features need to be programmed by trusted firmware as part of the boot sequence. If untrusted IPs or peripheral microcontrollers are enabled first, then the untrusted component can master transactions on the hardware bus and target memory or other assets to compromise the SoC boot firmware.

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-696 Incorrect Behavior Order Class Simple Incomplete

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs CWE-1193
CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels CWE-1193
Loading...
Loading...