Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Weaknesses in Security Hardware
ID:BOSS-262
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view (slice) covers issues that are found in Security Hardware that are not common to all technologies.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1250Improper Preservation of Consistency Between Independent Representations of Shared State
HasMemberAllowedB1326Missing Immutable Root of Trust in Hardware
HasMemberAllowedB1328Security Version Number Mutable to Older Versions
HasMemberAllowedV1330Remanent Data Readable after Memory Erase
HasMemberAllowedB1331Improper Isolation of Shared Resources in Network On Chip (NoC)
HasMemberAllowedB1429Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1250
Name: Improper Preservation of Consistency Between Independent Representations of Shared State
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1326
Name: Missing Immutable Root of Trust in Hardware
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1328
Name: Security Version Number Mutable to Older Versions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1330
Name: Remanent Data Readable after Memory Erase
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1331
Name: Improper Isolation of Shared Resources in Network On Chip (NoC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1429
Name: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-262 - Weaknesses in Security Hardware
Details not found