Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Weaknesses in Processor Hardware
ID:BOSS-264
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view (slice) covers issues that are found in Processor Hardware that are not common to all technologies.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1037Processor Optimization Removal or Modification of Security-critical Code
HasMemberAllowedB1252CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
HasMemberAllowedB1257Improper Access Control Applied to Mirrored or Aliased Memory Regions
HasMemberAllowedB1259Improper Restriction of Security Token Assignment
HasMemberAllowedB1260Improper Handling of Overlap Between Protected Memory Ranges
HasMemberAllowedB1279Cryptographic Operations are run Before Supporting Units are Ready
HasMemberAllowedB1281Sequence of Processor Instructions Leads to Unexpected Behavior
HasMemberAllowedB1296Incorrect Chaining or Granularity of Debug Components
HasMemberAllowedB1297Unprotected Confidential Information on Device is Accessible by OSAT Vendors
HasMemberAllowedB1299Missing Protection Mechanism for Alternate Hardware Interface
HasMemberAllowedB1317Improper Access Control in Fabric Bridge
HasMemberAllowedB1318Missing Support for Security Features in On-chip Fabrics or Buses
HasMemberAllowedB1319Improper Protection against Electromagnetic Fault Injection (EM-FI)
HasMemberAllowedB1320Improper Protection for Outbound Error Messages and Alert Signals
HasMemberAllowedB1338Improper Protections Against Hardware Overheating
HasMemberAllowedB1423Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
HasMemberAllowedB1429Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1037
Name: Processor Optimization Removal or Modification of Security-critical Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1252
Name: CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1257
Name: Improper Access Control Applied to Mirrored or Aliased Memory Regions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1259
Name: Improper Restriction of Security Token Assignment
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1260
Name: Improper Handling of Overlap Between Protected Memory Ranges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1279
Name: Cryptographic Operations are run Before Supporting Units are Ready
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1281
Name: Sequence of Processor Instructions Leads to Unexpected Behavior
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1296
Name: Incorrect Chaining or Granularity of Debug Components
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1297
Name: Unprotected Confidential Information on Device is Accessible by OSAT Vendors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1299
Name: Missing Protection Mechanism for Alternate Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1317
Name: Improper Access Control in Fabric Bridge
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1318
Name: Missing Support for Security Features in On-chip Fabrics or Buses
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1319
Name: Improper Protection against Electromagnetic Fault Injection (EM-FI)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1320
Name: Improper Protection for Outbound Error Messages and Alert Signals
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1338
Name: Improper Protections Against Hardware Overheating
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1423
Name: Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1429
Name: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
▼Vendors
Note: CVE records are filtered based on below selected vendors.
Not available
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-264 - Weaknesses in Processor Hardware
Details not found