Modos de Introdução
Architecture and Design
Implementation
Plataformas Aplicáveis
Linguagem
Class: Not Language-Specific (Undetermined)
Sistemas Operacionais
Class: Not OS-Specific (Undetermined)
Arquiteturas
Class: Not Architecture-Specific (Undetermined)
Tecnologias
Class: Not Technology-Specific (Undetermined)
Consequências Comuns
| Escopo |
Impacto |
Probabilidade |
| Access Control | Bypass Protection Mechanism
Note: Bypass of lock bit allows access and modification of system configuration even when the lock bit is set. | High |
Mitigações Potenciais
Phases : Architecture and Design // Implementation // Testing
Notas de Mapeamento de Vulnerabilidade
Justificativa : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comentário : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Padrões de Ataque Relacionados
| CAPEC-ID |
Nome do Padrão de Ataque |
| CAPEC-176 |
Configuration/Environment Manipulation
An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack. |
Referências
REF-1375
reglk_wrapper.sv
https://github.com/HACK-EVENT/hackatdac21/blob/cde1d9d6888bffab21d4b405ccef61b19c58dd3c/piton/design/chip/tile/ariane/src/reglk/reglk_wrapper.sv#L80C1-L80C48 REF-1376
Fix for reglk_wrapper.sv
https://github.com/HACK-EVENT/hackatdac21/blob/20238068b385d7ab704cabfb95ff95dd6e56e1c2/piton/design/chip/tile/ariane/src/reglk/reglk_wrapper.sv#L80
Submissão
| Nome |
Organização |
Data |
Data de lançamento |
Version |
| Arun Kanuparthi, Hareesh Khattri, Parbati Kumar Manna, Narasimha Kumar V Mangipudi |
Intel Corporation |
2020-01-15 +00:00 |
2020-02-24 +00:00 |
4.0 |
Modificações
| Nome |
Organização |
Data |
Comentário |
| CWE Content Team |
MITRE |
2020-08-20 +00:00 |
updated Common_Consequences, Demonstrative_Examples, Description, Modes_of_Introduction, Potential_Mitigations, Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2022-04-28 +00:00 |
updated Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2022-10-13 +00:00 |
updated Demonstrative_Examples |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2024-02-29 +00:00 |
updated Demonstrative_Examples, References |
| CWE Content Team |
MITRE |
2025-09-09 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Demonstrative_Examples, Weakness_Ordinalities |