CWE-1296 - Incorrect Chaining or Granularity of Debug Components
- Abstraction:Base
- Structure:Simple
- Status:Incomplete
- Release Date:2020-08-20
- Latest Modification Date:2023-06-29
Weakness Name
Incorrect Chaining or Granularity of Debug Components
Description
The product's debug components contain incorrect chaining or granularity of debug components.
For debugging and troubleshooting a chip, several hardware design elements are often implemented, including: Logic errors during design or synthesis could misconfigure the interconnection of the debug components, which could allow unintended access permissions.
Common Consequences
Scope: Confidentiality, Integrity, Access Control, Authentication, Authorization, Availability, Accountability
Impact: Gain Privileges or Assume Identity, Bypass Protection Mechanism, Execute Unauthorized Code or Commands, Modify Memory, Modify Files or Directories
Notes: Depending on the access to debug component(s) erroneously granted, an attacker could use the debug component to gain additional understanding about the system to further an attack and/or execute other commands. This could compromise any security property, including the ones listed above.