CWE-1274 - Improper Access Control for Volatile Memory Containing Boot Code
CWE-1274
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Stable
- Weakness Name
Improper Access Control for Volatile Memory Containing Boot Code
- Description
The product conducts a secure-boot process that transfers bootloader code from Non-Volatile Memory (NVM) into Volatile Memory (VM), but it does not have sufficient access control or other protections for the Volatile Memory.
Adversaries could bypass the secure-boot process and execute their own untrusted, malicious boot code. As a part of a secure-boot process, the read-only-memory (ROM) code for a System-on-Chip (SoC) or other system fetches bootloader code from Non-Volatile Memory (NVM) and stores the code in Volatile Memory (VM), such as dynamic, random-access memory (DRAM) or static, random-access memory (SRAM). The NVM is usually external to the SoC, while the VM is internal to the SoC. As the code is transferred from NVM to VM, it is authenticated by the SoC's ROM code. If the volatile-memory-region protections or access controls are insufficient to prevent modifications from an adversary or untrusted agent, the secure boot may be bypassed or replaced with the execution of an adversary's code.
- Common Consequences
Scope: Access Control, Integrity
Impact: Modify Memory, Execute Unauthorized Code or Commands, Gain Privileges or Assume Identity
- Related Weaknesses
- Release Date:
- 2020-02-24
- Latest Modification Date:
- 2024-02-29
Free security scan for your website