CWE entries in this view are listed in the 2021 CWE Most Important Hardware Weaknesses List, as determined by the Hardware CWE Special Interest Group (HW CWE SIG).
| Nature | Mapping | Type | ID | Name |
|---|---|---|---|---|
| HasMember | Allowed | B | 1189 | Improper Isolation of Shared Resources on System-on-a-Chip (SoC) |
| HasMember | Allowed | B | 1191 | On-Chip Debug and Test Interface With Improper Access Control |
| HasMember | Allowed | B | 1231 | Improper Prevention of Lock Bit Modification |
| HasMember | Allowed | B | 1233 | Security-Sensitive Hardware Controls with Missing Lock Bit Protection |
| HasMember | Allowed | B | 1240 | Use of a Cryptographic Primitive with a Risky Implementation |
| HasMember | Allowed | B | 1244 | Internal Asset Exposed to Unsafe Debug Access Level or State |
| HasMember | Allowed | B | 1256 | Improper Restriction of Software Interfaces to Hardware Features |
| HasMember | Allowed | B | 1260 | Improper Handling of Overlap Between Protected Memory Ranges |
| HasMember | Allowed | B | 1272 | Sensitive Information Uncleared Before Debug/Power State Transition |
| HasMember | Allowed | B | 1274 | Improper Access Control for Volatile Memory Containing Boot Code |
| HasMember | Allowed | B | 1277 | Firmware Not Updateable |
| HasMember | Allowed | B | 1300 | Improper Protection of Physical Side Channels |
This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Use this View or other Views to search and navigate for the appropriate weakness.
| Stakeholder | Description |
|---|---|
| Hardware Designers | By following this list, hardware designers and implementers are able to significantly reduce the number of weaknesses that occur in their products. |
| Product Customers | Customers can use the weaknesses in this view in order to formulate independent evidence of a claim by a product vendor to have eliminated / mitigated the most dangerous weaknesses. |
| Educators | Educators can use this view to focus curriculum on the most important hardware weaknesses. |
By following this list, hardware designers and implementers are able to significantly reduce the number of weaknesses that occur in their products.
Customers can use the weaknesses in this view in order to formulate independent evidence of a claim by a product vendor to have eliminated / mitigated the most dangerous weaknesses.
Educators can use this view to focus curriculum on the most important hardware weaknesses.