CWE-1231:预防锁定位修改不当
查看自定义信息:
在集成电路和硬件知识属性(IP)内核中,设备配置控件通常是由受信任的固件或软件模块(例如BIOS/Bootloader)重置设备电源后编程的,然后从任何进一步的修改中锁定。 这种行为通常使用受信任的锁位实现。设置时,锁定位会写入受保护的寄存器或地址区域的集合。在实现锁定位保护功能的实现中的设计或编码错误可能会允许设置软件后修改或清除锁定位。攻击者可能能够解锁位旨在保护的系统和功能。
This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
与观点“研究概念”相关(CWE-1000)
与视图“硬件设计”相关(CWE-1194)
The different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
This listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.
Languages Class: Not Language-Specific(Undetermined Prevalence) 操作系统 Class: Not OS-Specific(Undetermined Prevalence) Architectures 班级:不是特定于建筑的(Undetermined Prevalence) 技术 班级:不是针对技术的(Undetermined Prevalence)
This table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
示例1 考虑以下示例设计的数字热传感器,该数字热传感器检测到硅和触发系统关闭的过热。系统临界温度限制(criality_temp_limit)和热传感器校准(temp_sensor_calib)数据必须由固件编程,然后需要锁定寄存器(temp_sensor_lock)。
(bad code)
示例语言:Other
在此示例中,请注意,如果系统加热到临界温度,则系统的响应由temp_hw_shutdown bit [1]控制,这是不可锁定的。因此,关键温度传感器的预期安全属性无法得到充分保护,因为即使设置了锁定位以禁用关闭响应,软件也会误配置temp_hw_shutdown寄存器。
(好代码)
To fix this weakness, one could change the TEMP_HW_SHUTDOWN field to be locked by TEMP_SENSOR_LOCK.
This MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.
提供更多信息 - 请选择其他过滤器。
|
使用共同弱点枚举(CWE)和本网站的相关参考Terms of Use。CWE由美国国土安全部(DHS)Cybersecurity and Infrastructure Security Agency(CISA) and managed by theHomeland Security Systems Engineering and Development Institute(HSSEDI)由manbetx客户端首页(MITER)。版权所有©2006–2023,Miter Comanbetx客户端首页rporation。CWE,CWSS,CWRAF和CWE徽标是Miter Corporation的商标。manbetx客户端首页 |