logo

CWE-1193 - Power-On of Untrusted Execution Core Before Enabling Fabric Access Control

CWE-1193

  • Abstraction:
  • Base
  • Structure:
  • Simple
  • Status:
  • Draft
Weakness Name

Power-On of Untrusted Execution Core Before Enabling Fabric Access Control

Description

The product enables components that contain untrusted firmware before memory and fabric access controls have been enabled.

After initial reset, System-on-Chip (SoC) fabric access controls and other security features need to be programmed by trusted firmware as part of the boot sequence. If untrusted IPs or peripheral microcontrollers are enabled first, then the untrusted component can master transactions on the hardware bus and target memory or other assets to compromise the SoC boot firmware.

Common Consequences

Scope: Access Control

Impact: Bypass Protection Mechanism

Notes: An untrusted component can master transactions on the HW bus and target memory or other assets to compromise the SoC boot firmware.

Related Weaknesses
  • Release Date:
  • 2020-02-24
  • Latest Modification Date:
  • 2023-06-29

Free security scan for your website