CWE ID
|
Description
|
CWE-732 |
Incorrect Permission Assignment for Critical Resource |
CWE-1190 |
DMA Device Enabled Too Early in Boot Phase |
CWE-1191 |
Exposed Chip Debug and Test Interface With Insufficient or Missing Authorization |
CWE-1193 |
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control |
CWE-1220 |
Insufficient Granularity of Access Control |
CWE-1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
CWE-1231 |
Improper Implementation of Lock Protection Registers |
CWE-1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
CWE-1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
CWE-1244 |
Improper Access to Sensitive Information Using Debug and Test Interfaces |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
CWE-1259 |
Improper Restriction of Security Token Assignment |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
CWE-1274 |
Insufficient Protections on the Volatile Memory Containing Boot Code |
CWE-1280 |
Access Control Check Implemented After Asset is Accessed |
CWE-1311 |
Improper Translation of Security Attributes by Fabric Bridge |
CWE-1313 |
Hardware Allows Activation of Test or Debug Logic at Runtime |
CWE-1315 |
Improper Setting of Bus Controlling Capability in Fabric End-point |
CWE-1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
CWE-1318 |
Missing Support for Security Features in On-chip Fabrics or Buses |
CWE-1320 |
Improper Protection for Out of Bounds Signal Level Alerts |
CWE-1321 |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |
CWE-1326 |
Missing Immutable Root of Trust in Hardware |