Sposoby wprowadzenia
Architecture and Design : Such issues could be introduced during hardware architecture and design and identified later during Testing or System Configuration phases.
Implementation : Such issues could be introduced during implementation and identified later during Testing or System Configuration phases.
Odpowiednie platformy
Język
Class: Not Language-Specific (Undetermined)
Systemy operacyjne
Class: Not OS-Specific (Undetermined)
Architektury
Class: Not Architecture-Specific (Undetermined)
Technologie
Class: Not Technology-Specific (Undetermined)
Typowe konsekwencje
| Zakres |
Wpływ |
Prawdopodobieństwo |
| Access Control | Modify Memory
Note: System Configuration protected by the lock bit can be modified even when the lock is set. | |
Zaobserwowane przykłady
| Odniesienia |
Opis |
| Certain servers leave a write protection lock bit
unset after boot, potentially allowing modification of
parts of flash memory. |
| Chain: chipset has a race condition (CWE-362) between when an interrupt handler detects an attempt to write-enable the BIOS (in violation of the lock bit), and when the handler resets the write-enable bit back to 0, allowing attackers to issue BIOS writes during the timing window [REF-1237]. |
Potencjalne środki zaradcze
Phases : Architecture and Design // Implementation // Testing
Metody wykrywania
Manual Analysis
Set the lock bit. Attempt to modify the
information protected by the lock bit. If the information
is changed, implement a design fix. Retest. Also, attempt
to indirectly clear the lock bit or bypass
it.
Skuteczność : High
Uwagi dotyczące mapowania podatności
Uzasadnienie : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Komentarz : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Powiązane wzorce ataków
| CAPEC-ID |
Nazwa wzorca ataku |
| CAPEC-176 |
Configuration/Environment Manipulation
An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack. |
| CAPEC-680 |
Exploitation of Improperly Controlled Registers
|
Odniesienia
REF-1237
Intel BIOS locking mechanism contains race condition that enables write protection bypass
CERT Coordination Center.
https://www.kb.cert.org/vuls/id/766164/
Zgłoszenie
| Nazwa |
Organizacja |
Data |
Data wydania |
Version |
| Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi |
Intel Corporation |
2020-01-15 +00:00 |
2020-02-24 +00:00 |
4.0 |
Modyfikacje
| Nazwa |
Organizacja |
Data |
Komentarz |
| CWE Content Team |
MITRE |
2020-08-20 +00:00 |
updated Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2021-03-15 +00:00 |
updated Maintenance_Notes |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Demonstrative_Examples, Description, Detection_Factors, Maintenance_Notes, Name, Observed_Examples, Potential_Mitigations, References, Relationships, Weakness_Ordinalities |
| CWE Content Team |
MITRE |
2022-04-28 +00:00 |
updated Related_Attack_Patterns, Relationships |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2025-04-03 +00:00 |
updated Demonstrative_Examples |
| CWE Content Team |
MITRE |
2025-09-09 +00:00 |
updated Relationships |