CWE-1296 - Incorrect Chaining or Granularity of Debug Components
CWE-1296
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Incorrect Chaining or Granularity of Debug Components
- Description
The product's debug components contain incorrect chaining or granularity of debug components.
For debugging and troubleshooting a chip, several hardware design elements are often implemented, including: Logic errors during design or synthesis could misconfigure the interconnection of the debug components, which could allow unintended access permissions.
- Common Consequences
Scope: Confidentiality, Integrity, Access Control, Authentication, Authorization, Availability, Accountability
Impact: Gain Privileges or Assume Identity, Bypass Protection Mechanism, Execute Unauthorized Code or Commands, Modify Memory, Modify Files or Directories
Notes: Depending on the access to debug component(s) erroneously granted, an attacker could use the debug component to gain additional understanding about the system to further an attack and/or execute other commands. This could compromise any security property, including the ones listed above.
- Related Weaknesses
- Release Date:
- 2020-08-20
- Latest Modification Date:
- 2023-06-29
Free security scan for your website