Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-681:Exploitation of Improperly Controlled Hardware Security Identifiers
Attack Pattern ID:681
Version:v3.9
Attack Pattern Name:Exploitation of Improperly Controlled Hardware Security Identifiers
Abstraction:Detailed
Status:Draft
Likelihood of Attack:Medium
Typical Severity:Very High
DetailsContent HistoryRelated WeaknessesReports
▼Description

An adversary takes advantage of missing or incorrectly configured security identifiers (e.g., tokens), which are used for access control within a System-on-Chip (SoC), to read/write data or execute a given action.

▼Extended Description
  • The security identifiers are missing
  • The security identifiers are incorrectly implemented or generated
  • The security identifiers are generated with an obsolete encoding
  • The security identifiers are generated and implemented correctly, but are improperly protected

A System-on-Chip (SoC) often implements a security identifier mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, these mechanisms may be exploitable due to any number of the following:

If the security identifiers leveraged by the SoC are missing or misconfigured, an adversary may be able to take advantage of this shortcoming to circumvent the intended access controls. This could result in the adversary gaining unintended access, performing a Denial of Service (DoS), escalating privileges, or spoofing actions from a trusted agent.

▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfS1Accessing Functionality Not Properly Constrained by ACLs
ChildOfS180Exploiting Incorrectly Configured Access Control Security Levels
Nature: ChildOf
Type: Standard
ID: 1
Name: Accessing Functionality Not Properly Constrained by ACLs
Nature: ChildOf
Type: Standard
ID: 180
Name: Exploiting Incorrectly Configured Access Control Security Levels
▼Execution Flow
▼Prerequisites
Awareness of the hardware being leveraged.
Access to the hardware being leveraged.
▼Skills Required
Medium

Ability to execute actions within the SoC.


High

Intricate knowledge of the identifiers being utilized.

▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
IntegrityN/AModify DataN/A
ConfidentialityN/ARead DataN/A
ConfidentialityAccess ControlAuthorizationN/AGain PrivilegesN/A
Scope: Integrity
Likelihood: N/A
Impact: Modify Data
Note: N/A
Scope: Confidentiality
Likelihood: N/A
Impact: Read Data
Note: N/A
Scope: Confidentiality, Access Control, Authorization
Likelihood: N/A
Impact: Gain Privileges
Note: N/A
▼Mitigations
Review generation of security identifiers for design inconsistencies and common weaknesses.
Review security identifier decoders for design inconsistencies and common weaknesses.
Test security identifier definition, access, and programming flow in both pre-silicon and post-silicon environments.
▼Example Instances
▼Related Weaknesses
IDName
CWE-1259Improper Restriction of Security Token Assignment
CWE-1267Policy Uses Obsolete Encoding
CWE-1270Generation of Incorrect Security Tokens
CWE-1294Insecure Security Identifier Mechanism
CWE-1302Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
ID: CWE-1259
Name: Improper Restriction of Security Token Assignment
ID: CWE-1267
Name: Policy Uses Obsolete Encoding
ID: CWE-1270
Name: Generation of Incorrect Security Tokens
ID: CWE-1294
Name: Insecure Security Identifier Mechanism
ID: CWE-1302
Name: Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Reference ID: REF-694
Title: PCIe Device Measurement Requirements
Author:
Publication:
Publisher:Intel Corporation
Edition:
URL:https://www.intel.com/content/dam/www/public/us/en/documents/reference-guides/pcie-device-security-enhancements.pdf
URL Date:2021-10-21
Day:N/A
Month:09
Year:2018
Reference ID: REF-695
Title: BIOS Chronomancy: Fixing the Core Root of Trust for Measurement
Author: John Butterworth, Cory Kallenberg, Xeno Kovah
Publication:
Publisher:
Edition:
URL:https://media.blackhat.com/us-13/US-13-Butterworth-BIOS-Security-Slides.pdf
URL Date:2021-10-21
Day:31
Month:07
Year:2013
Details not found