CWE-1233 - Security-Sensitive Hardware Controls with Missing Lock Bit Protection
CWE-1233
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Stable
- Weakness Name
Security-Sensitive Hardware Controls with Missing Lock Bit Protection
- Description
The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware system configuration.
Integrated circuits and hardware intellectual properties (IPs) might provide device configuration controls that need to be programmed after device power reset by a trusted firmware or software module, commonly set by BIOS/bootloader. After reset, there can be an expectation that the controls cannot be used to perform any further modification. This behavior is commonly implemented using a trusted lock bit, which can be set to disable writes to a protected set of registers or address regions. The lock protection is intended to prevent modification of certain system configuration (e.g., memory/memory protection unit configuration). However, if the lock bit does not effectively write-protect all system registers or controls that could modify the protected system configuration, then an adversary may be able to use software to access the registers/controls and modify the protected hardware configuration.
- Common Consequences
Scope: Access Control
Impact: Modify Memory
Notes: System Configuration protected by the lock bit can be modified even when the lock is set.
- Related Weaknesses
- Release Date:
- 2020-02-24
- Latest Modification Date:
- 2023-06-29
Free security scan for your website