Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Cross-Cutting Problems
Category ID:1208
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category can arise in multiple areas of hardware design or can apply to a wide cross-section of components.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1194Hardware Design
HasMemberProhibitedB1053Missing Documentation for Design
HasMemberProhibitedC1059Insufficient Technical Documentation
HasMemberAllowed-with-ReviewC1263Improper Physical Access Control
HasMemberAllowedB1277Firmware Not Updateable
HasMemberAllowedB1301Insufficient or Incomplete Data Removal within Hardware Component
HasMemberAllowedB1329Reliance on Component That is Not Updateable
HasMemberAllowed-with-ReviewC1357Reliance on Insufficiently Trustworthy Component
HasMemberAllowedB1429Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
HasMemberAllowedB440Expected Behavior Violation
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1194
Name: Hardware Design
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1053
Name: Missing Documentation for Design
Nature: HasMember
Mapping: Prohibited
Type: Class
ID: 1059
Name: Insufficient Technical Documentation
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1263
Name: Improper Physical Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1277
Name: Firmware Not Updateable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1301
Name: Insufficient or Incomplete Data Removal within Hardware Component
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1329
Name: Reliance on Component That is Not Updateable
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1357
Name: Reliance on Insufficiently Trustworthy Component
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1429
Name: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 440
Name: Expected Behavior Violation
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found