CWE-1255: Comparison Logic is Vulnerable to Power Side-Channel Attacks

ID CWE-1255
Abstraction Variant
Structure Simple
Status Draft
Number of CVEs 2
A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.

The power consumed by a device may be instrumented and monitored in real time. If the algorithm for evaluating security tokens is not sufficiently robust, the power consumption may vary by token entry comparison against the reference value. Further, if retries are unlimited, the power difference between a "good" entry and a "bad" entry may be observed and used to determine whether each entry itself is correct thereby allowing unauthorized parties to calculate the reference value.

Modes of Introduction

Phase Note
Architecture and Design The design of the algorithm itself may intrinsically allow the power side channel attack to be effective
Implementation This weakness may be introduced during implementation despite a robust design that otherwise prevents exploitation

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific
Operating_system Not OS-Specific
Architecture Not Architecture-Specific
Technology Not Technology-Specific

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-1300 Improper Protection of Physical Side Channels Base Simple Stable
CWE-1194 Hardware Design Draft CWE-1259 Improper Restriction of Security Token Assignment Base Simple Incomplete

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-189 Black Box Reverse Engineering CWE-1255

CVEs Published

CVSS Severity

CVSS Severity - By Year

CVSS Base Score

# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...
Loading...