Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1256:Improper Restriction of Software Interfaces to Hardware Features
Weakness ID:1256
Version:v4.17
Weakness Name:Improper Restriction of Software Interfaces to Hardware Features
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Stable
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Submissions
Submission DateRelease DateSubmitterOrganizationVersionComment
2020-05-082020-02-24Nicole FernCycuity (originally submitted as Tortuga Logic)4.1

N/A

Submission Date: 2020-05-08

Release Date: 2020-02-24

Submitter: Nicole Fern

Organization: Cycuity (originally submitted as Tortuga Logic)

Version: 4.1

Comment:

N/A

▼Modifications
Modification DateRelease DateModifierOrganizationVersionImportanceComment
2020-08-20N/ACWE Content TeamMITREN/AN/A

updated Demonstrative_Examples, Description, Maintenance_Notes, Related_Attack_Patterns

2021-03-15N/ACWE Content TeamMITREN/AN/A

updated Demonstrative_Examples, Functional_Areas, Maintenance_Notes

2021-07-20N/ACWE Content TeamMITREN/AN/A

updated Demonstrative_Examples, Observed_Examples

2021-10-28N/ACWE Content TeamMITREN/AN/A

updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Modes_of_Introduction, Name, Observed_Examples, References, Relationships, Weakness_Ordinalities

2022-04-28N/ACWE Content TeamMITREN/AN/A

updated Applicable_Platforms

2022-06-28N/ACWE Content TeamMITREN/AN/A

updated Applicable_Platforms

2023-01-31N/ACWE Content TeamMITREN/AN/A

updated Related_Attack_Patterns

2023-04-27N/ACWE Content TeamMITREN/AN/A

updated Relationships

2023-06-29N/ACWE Content TeamMITREN/AN/A

updated Mapping_Notes

2025-04-032025-04-03CWE Content TeamMITRE4.17N/A

updated Demonstrative_Examples

Modification Date: 2020-08-20

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Demonstrative_Examples, Description, Maintenance_Notes, Related_Attack_Patterns

Modification Date: 2021-03-15

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Demonstrative_Examples, Functional_Areas, Maintenance_Notes

Modification Date: 2021-07-20

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Demonstrative_Examples, Observed_Examples

Modification Date: 2021-10-28

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Modes_of_Introduction, Name, Observed_Examples, References, Relationships, Weakness_Ordinalities

Modification Date: 2022-04-28

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Applicable_Platforms

Modification Date: 2022-06-28

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Applicable_Platforms

Modification Date: 2023-01-31

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Related_Attack_Patterns

Modification Date: 2023-04-27

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Relationships

Modification Date: 2023-06-29

Release Date: N/A

Modifier: CWE Content Team

Organization: MITRE

Version: N/A

Importance: N/A

Comment:

updated Mapping_Notes

Modification Date: 2025-04-03

Release Date: 2025-04-03

Modifier: CWE Content Team

Organization: MITRE

Version: 4.17

Importance: N/A

Comment:

updated Demonstrative_Examples

▼Contributions
Contributor DateRelease DateTypeContributorOrganizationVersionComment
2021-07-16N/AContentN/ACycuity (originally submitted as Tortuga Logic)N/A

Provided Demonstrative Example for Hardware Root of Trust

2021-10-11N/AContentAnders Nordstrom, Alric AlthoffCycuity (originally submitted as Tortuga Logic)N/A

Provided detection method

2021-10-15N/AContentNicole FernRiscureN/A

updated description and extended description, detection method, and observed examples

Contributor Date: 2021-07-16

Release Date: N/A

Type: Content

Contributor: N/A

Organization: Cycuity (originally submitted as Tortuga Logic)

Version: N/A

Comment:

Provided Demonstrative Example for Hardware Root of Trust

Contributor Date: 2021-10-11

Release Date: N/A

Type: Content

Contributor: Anders Nordstrom, Alric Althoff

Organization: Cycuity (originally submitted as Tortuga Logic)

Version: N/A

Comment:

Provided detection method

Contributor Date: 2021-10-15

Release Date: N/A

Type: Content

Contributor: Nicole Fern

Organization: Riscure

Version: N/A

Comment:

updated description and extended description, detection method, and observed examples

▼Previous Name Entries
Change DatePrevious Entry NameVersion
2021-10-28

Hardware Features Enable Physical Attacks from Software

N/A

Change Date: 2021-10-28

Version: N/A

Previous Entry Name: Hardware Features Enable Physical Attacks from Software