CWE

普遍的弱点

A Community-Developed List of Software & Hardware Weakness Types

2021 CWE最重要的硬件弱点
CWE前25个最危险的弱点
Home>CWEList>CWE- Individual Dictionary Definition (4.10)
ID

CWE-1222:地址区域受寄存器锁保护区域的粒度不足

Weakness ID: 1222
Abstraction:变体
Structure:简单的
查看自定义信息:
+描述
The product defines a large address region protected from modification by the same register lock control bit. This results in a conflict between the functional requirement that some addresses need to be writable by software during operation and the security requirement that the system configuration lock bit must be set during the boot process.
+扩展描述

集成的电路和硬件IP可以公开设备配置控件,这些配置控件需要在设备电源重置后由受信任的固件或软件模块(通常由BIOS/Bootloader设置)进行编程,然后从任何进一步的修改中锁定。在硬件设计中,通常使用可编程锁定位实现这一点,该锁定位允许/禁用为受保护的寄存器或地址区域的集合。设置可编程锁定位时,可以将相关的地址区域实现为硬件逻辑中的硬编码值,以后无法更改。

A problem can arise wherein the protected region definition is not granular enough. After the programmable lock bit has been set, then this new functionality cannot be implemented without change to the hardware design.

+Relationships
Section HelpThis table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与观点“研究概念”相关(CWE-1000)
自然 类型 ID Name
Childof BaseBase - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 1220 访问控制的粒度不足
Section HelpThis table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与视图“硬件设计”相关(CWE-1194)
自然 类型 ID Name
成员 Category类别 - 包含共享共同特征的其他条目的CWE条目。 1198 Privilege Separation and Access Control Issues
+介绍模式
Section Help引言的不同模式提供了有关如何以及何时引入这种弱点的信息。该阶段识别可能发生介绍的生命周期中的一个点,而音符提供了与给定阶段中引言有关的典型情况。
Phase 笔记
建筑和设计 由于在这些阶段定义了软件控件和配置,因此在硬件体系结构和设计期间引入了此类问题,并在测试或系统配置阶段进行了稍后确定。
+Applicable Platforms
Section Help该清单显示了可能出现的弱点的可能区域。这些可能适用于特定的命名语言,操作系统,体系结构,范式,技术或一类此类平台。该平台与给定弱点出现在该实例的频率一起列出。

语言

Class: Not Language-Specific(Undetermined Prevalence)

操作系统

Class: Not OS-Specific(Undetermined Prevalence)

体系结构

班级:不是特定于建筑的(Undetermined Prevalence)

技术

班级:芯片上的系统(Undetermined Prevalence)

+常见后果
Section Help该表指定与弱点相关的不同个人后果。该范围确定了违反的应用程序安全区域,而影响描述了如果对手成功利用这一弱点,就会产生负面的技术影响。其可能性提供了有关预期相对于列表中其他后果的特定后果的可能性的信息。例如,可能会利用弱点来实现一定的影响,但很可能会利用它来实现不同的影响。
Scope Impact Likelihood
访问控制

技术影响:其他

系统安全配置不能以与设备功能要求不冲突的方式定义。
+示例的例子

示例1

For example, consider a hardware unit with a 32 kilobyte configuration address space where the first 8 kilobyte address contains security sensitive controls that must only be writable by device bootloader. One way to protect the security configuration could be to define a 32 bit system configuration locking register (SYS_LOCK) where each bit lock locks the corresponding 1 kilobyte region.

(bad code)
示例语言:其他
地址 登记
0x0000 SYS_LOCK: 32 bit system configuration lock register, each bit is write-1-once
0x0004 SECURITY_FEATURE_ENABLE: 32 bit register controlling enabling of security features
...
0x0310 SW_Mode:32位软件模式指示寄存器
地址区域 锁位
0x0000-0x03ff sys_lock [0]
0x0400-0x07ff sys_lock [1]
...
0x7C00-0x7fff sys_lock [31]

如果在第一个千数地址范围内存在寄存器(例如sw_mode,地址0x310),并且需要在运行时进行软件处理,则该寄存器不能在安全配置的系统中写入,因为必须设置SYS_LOCK寄存器锁定位0以保护其他安全性设置(例如Security_feature_enable,地址0x0004)。唯一的解决方法是更改​​硬件逻辑或不设置安全锁位。

+潜在的缓解

Phase: Architecture and Design

The defining of protected locked registers should be reviewed or tested early in the design phase with software teams to ensure software flows are not blocked by the security locks.

作为使用寄存器锁定控制位和固定访问控制区域的替代方法,硬件设计可以使用可编程的安全访问控制配置,以便设备受信任的固件可以根据软件使用和安全模型配置和更改受保护区域。

+内容历史记录
+提交
Submission Date Submitter 组织
2019-12-12 Arun Kanuparthi,Hareesh Khattri,Parbati Kumar Manna,Narasimha Kumar v Mangipudi 英特尔公司
+Modifications
Modification Date Modifier 组织
2020-08-20 CWEContent Team MITER
更新相关的_attack_patterns
2022-04-28 CWEContent Team MITER
更新相关的_attack_patterns
2023-01-31 CWEContent Team MITER
更新的关系
提供更多信息 - 请选择其他过滤器。
页面最后更新:January 31, 2023