Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Power, Clock, Thermal, and Reset Concerns
Category ID:1206
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to system power, voltage, current, temperature, clocks, system state saving/restoring, and resets at the platform and SoC level.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1194Hardware Design
HasMemberAllowedB1247Improper Protection Against Voltage and Clock Glitches
HasMemberAllowedB1232Improper Lock Behavior After Power State Transition
HasMemberAllowedB1248Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
HasMemberAllowedV1255Comparison Logic is Vulnerable to Power Side-Channel Attacks
HasMemberAllowedB1256Improper Restriction of Software Interfaces to Hardware Features
HasMemberAllowedB1271Uninitialized Value on Reset for Registers Holding Security Settings
HasMemberAllowedB1304Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
HasMemberAllowedB1314Missing Write Protection for Parametric Data Values
HasMemberAllowedB1320Improper Protection for Outbound Error Messages and Alert Signals
HasMemberAllowedB1332Improper Handling of Faults that Lead to Instruction Skips
HasMemberAllowedB1338Improper Protections Against Hardware Overheating
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1194
Name: Hardware Design
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1247
Name: Improper Protection Against Voltage and Clock Glitches
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1232
Name: Improper Lock Behavior After Power State Transition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1248
Name: Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1255
Name: Comparison Logic is Vulnerable to Power Side-Channel Attacks
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1256
Name: Improper Restriction of Software Interfaces to Hardware Features
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1271
Name: Uninitialized Value on Reset for Registers Holding Security Settings
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1304
Name: Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1314
Name: Missing Write Protection for Parametric Data Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1320
Name: Improper Protection for Outbound Error Messages and Alert Signals
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1332
Name: Improper Handling of Faults that Lead to Instruction Skips
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1338
Name: Improper Protections Against Hardware Overheating
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found