Einführungsmodi
Integration
Manufacturing
Anwendbare Plattformen
Sprache
Name: VHDL (Undetermined)
Name: Verilog (Undetermined)
Class: Compiled (Undetermined)
Betriebssysteme
Class: Not OS-Specific (Undetermined)
Architekturen
Class: Not Architecture-Specific (Undetermined)
Technologien
Name: Other (Undetermined)
Class: Not Technology-Specific (Undetermined)
Häufige Konsequenzen
| Bereich |
Auswirkung |
Wahrscheinlichkeit |
Confidentiality Integrity Availability Access Control Accountability Authentication Authorization Non-Repudiation | Modify Memory, Read Memory, Modify Files or Directories, Read Files or Directories, Modify Application Data, Execute Unauthorized Code or Commands, Gain Privileges or Assume Identity, Bypass Protection Mechanism
Note: Once unlock credentials are compromised, an attacker can use the credentials to unlock the device and gain unauthorized access to the hidden functionalities protected by those credentials. | |
Mögliche Gegenmaßnahmen
Phases : Integration
Ensure the unlock credentials are shared with the minimum number of parties and with utmost secrecy. To limit the risk associated with compromised credentials, where possible, the credentials should be part-specific.
Phases : Manufacturing
Ensure the unlock credentials are shared with the minimum number of parties and with utmost secrecy. To limit the risk associated with compromised credentials, where possible, the credentials should be part-specific.
Hinweise zur Schwachstellen-Zuordnung
Begründung : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Kommentar : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Verwandte Angriffsmuster
| CAPEC-ID |
Name des Angriffsmusters |
| CAPEC-560 |
Use of Known Domain Credentials
|
Hinweise
This entry is still under development and will continue to see updates and content improvements.
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
Version |
| Parbati Kumar Manna, Hareesh Khattri, Arun Kanuparthi |
Intel Corporation |
2020-05-29 +00:00 |
2020-02-24 +00:00 |
4.1 |
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CWE Content Team |
MITRE |
2020-08-20 +00:00 |
updated Demonstrative_Examples, Description, Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Demonstrative_Examples, Description |
| CWE Content Team |
MITRE |
2022-10-13 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2025-04-03 +00:00 |
updated Demonstrative_Examples |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Weakness_Ordinalities |