Modes Of Introduction
Architecture and Design
Implementation
Applicable Platforms
Language
Class: Not Language-Specific (Undetermined)
Operating Systems
Class: Not OS-Specific (Undetermined)
Architectures
Class: Not Architecture-Specific (Undetermined)
Technologies
Class: Not Technology-Specific (Undetermined)
Common Consequences
| Scope |
Impact |
Likelihood |
Access Control Authorization | Bypass Protection Mechanism, Gain Privileges or Assume Identity
Note: If the logic used to determine system-security state (by leveraging the values sensed from the fuses) uses negative logic, an attacker might blow the fuse and drive the system to an insecure state. | |
| Availability | DoS: Crash, Exit, or Restart | |
| Confidentiality | Read Memory | |
| Integrity | Modify Memory, Execute Unauthorized Code or Commands | |
Potential Mitigations
Phases : Architecture and Design
Logic should be designed in a way that blown fuses do not put the product into an insecure state that can be leveraged by an attacker.
Vulnerability Mapping Notes
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Related Attack Patterns
| CAPEC-ID |
Attack Pattern Name |
| CAPEC-74 |
Manipulating State
|
Notes
This entry is still under development and will continue to see updates and content improvements.
References
REF-1080
Security Failures in Secure Devices
Christopher Tarnovsky.
https://www.blackhat.com/presentations/bh-europe-08/Tarnovsky/Presentation/bh-eu-08-tarnovsky.pdf
Submission
| Name |
Organization |
Date |
Date release |
Version |
| Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi |
Intel Corporation |
2019-10-15 +00:00 |
2020-02-24 +00:00 |
4.1 |
Modifications
| Name |
Organization |
Date |
Comment |
| CWE Content Team |
MITRE |
2020-08-20 +00:00 |
updated Applicable_Platforms, Demonstrative_Examples, Description |
| CWE Content Team |
MITRE |
2021-07-20 +00:00 |
updated Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Common_Consequences, Description, Weakness_Ordinalities |