Détail du CWE-1429

CWE-1429

Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Incomplete
2025-04-03
00h00 +00:00
2025-12-11
00h00 +00:00
Notifications pour un CWE
Restez informé de toutes modifications pour un CWE spécifique.
Gestion des notifications

Nom: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface

The product has a hardware interface that silently discards operations in situations for which feedback would be security-relevant, such as the timely detection of failures or attacks.

Informations générales

Modes d'introduction

Architecture and Design
Implementation
Requirements

Plateformes applicables

Langue

Name: C (Undetermined)
Name: C++ (Undetermined)
Name: Verilog (Undetermined)
Class: Hardware Description Language (Undetermined)
Class: Not Language-Specific (Undetermined)

Architectures

Name: ARM (Undetermined)
Name: x86 (Undetermined)
Class: Embedded (Undetermined)

Technologies

Name: Security Hardware (Undetermined)
Name: Processor Hardware (Undetermined)
Name: Microcontroller Hardware (Undetermined)
Class: System on Chip (Undetermined)

Conséquences courantes

Portée Impact Probabilité
ConfidentialityRead Memory, Read Files or DirectoriesMedium
IntegrityModify Memory, Modify Files or DirectoriesMedium
AvailabilityDoS: Resource Consumption (Memory), DoS: Crash, Exit, or RestartHigh

Exemples observés

Références Description

[REF-1468]

Open source silicon root of trust (RoT) product does not immediately report when an integrity check fails for memory requests, causing the product to accept and continue processing data [REF-1468]

Mesures d’atténuation potentielles

Phases : Architecture and Design
Phases : Implementation

Méthodes de détection

Automated Static Analysis - Source Code

Efficacité : High

Manual Static Analysis - Source Code

Efficacité : Moderate

Notes de cartographie des vulnérabilités

Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commentaire : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

Références

REF-1468

OpenTitan issue: [rv_core_ibex] Bus errors on integrity check failure
GregAC.
https://github.com/lowRISC/opentitan/issues/11336

Soumission

Nom Organisation Date Date de publication Version
Amisha Srivastava University of Texas at Dallas 2023-12-20 +00:00 2025-04-03 +00:00 4.17

Modifications

Nom Organisation Date Commentaire
CWE Content Team MITRE 2025-12-11 +00:00 updated Demonstrative_Examples, Weakness_Ordinalities