CWE-1431 Details

CWE-1431

Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
Incomplete
2025-04-03
00h00 +00:00
2025-12-11
00h00 +00:00
Benachrichtigungen für ein CWE
Bleiben Sie über alle Änderungen zu einem bestimmten CWE informiert.
Benachrichtigungen verwalten

Name: Driving Intermediate Cryptographic State/Results to Hardware Module Outputs

The product uses a hardware module implementing a cryptographic algorithm that writes sensitive information about the intermediate state or results of its cryptographic operations via one of its output wires (typically the output port containing the final result).

Allgemeine Informationen

Einführungsmodi

Implementation

Anwendbare Plattformen

Sprache

Class: Not Language-Specific (Undetermined)

Architekturen

Class: Not Architecture-Specific (Undetermined)

Technologien

Class: System on Chip (Undetermined)

Häufige Konsequenzen

Bereich Auswirkung Wahrscheinlichkeit
ConfidentialityRead Memory, Read Application DataUnknown

Mögliche Gegenmaßnahmen

Phases : Architecture and Design
Phases : Implementation

Erkennungsmethoden

Automated Static Analysis - Source Code

Wirksamkeit : High

Simulation / Emulation

Wirksamkeit : High

Formal Verification

Wirksamkeit : High

Manual Analysis

Wirksamkeit : Opportunistic

Hinweise zur Schwachstellen-Zuordnung

Begründung : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Kommentar : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

Referenzen

REF-1469

OpenTitan issue: [otp_ctrl] Prevent broadcast of scrambler's input/intermediate values #13043
Andres Meza.
https://github.com/lowRISC/opentitan/pull/13043

REF-1470

Security Verification of the OpenTitan Hardware Root of Trust
Andres Meza, Francesco Restuccia, Jason Oberg, Dominic Rizzo, Ryan Kastner.
https://ieeexplore.ieee.org/document/10106105

REF-1471

Security Verification of an Open Source Hardware Root of Trust
Jason Oberg.
https://cycuity.com/type/blog/security-verification-of-an-open-source-hardware-root-of-trust/

REF-1472

Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
Christophe Clavier, Quentin Isorez, Damien Marion, Antoine Wurcker.
https://doi.org/10.1007/s12095-014-0112-7

REF-1473

Practical Reverse Engineering of Secret Sboxes by Side-Channel Analysis
Dirmanto Jap, Shivam Bhasin.
https://doi.org/10.1109/ISCAS45731.2020.9180848

Einreichung

Name Organisation Datum Veröffentlichungsdatum Version
Andres Meza University of California, San Diego 2022-08-15 +00:00 2025-04-03 +00:00 4.17

Änderungen

Name Organisation Datum Kommentar
CWE Content Team MITRE 2025-09-09 +00:00 updated Relationships
CWE Content Team MITRE 2025-12-11 +00:00 updated Weakness_Ordinalities