Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-702:Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
Attack Pattern ID:702
Version:v3.9
Attack Pattern Name:Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
Abstraction:Detailed
Status:Draft
Likelihood of Attack:Low
Typical Severity:Medium
DetailsContent HistoryRelated WeaknessesReports
1Weaknesses found

CWE-1296
Incorrect Chaining or Granularity of Debug Components
ShareView Details
Incorrect Chaining or Granularity of Debug Components
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in0CVEs

The product's debug components contain incorrect chaining or granularity of debug components.

Impacts-
Execute Unauthorized Code or CommandsGain Privileges or Assume IdentityModify MemoryBypass Protection MechanismModify Files or Directories
Tags-
VHDLVerilogProcessor HardwareExecute Unauthorized Code or Commands (impact)Bypass Protection Mechanism (impact)Modify Files or Directories (impact)Modify Memory (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available