Category: Power, Clock, Thermal, and Reset Concerns

Draft
Summary

Weaknesses in this category are related to system power, voltage, current, temperature, clocks, system state saving/restoring, and resets at the platform and SoC level.

Membership
IDNameDescription
CWE-1232Improper Lock Behavior After Power State TransitionRegister lock bit protection disables changes to system configuration once the bit is set. Some of the protected registers or lock bits become programmable after power state transitions (e.g., Entry and wake from low power sleep modes) causing the system configuration to be changeable.
CWE-1247Improper Protection Against Voltage and Clock GlitchesThe device does not contain or contains incorrectly implemented circuitry or sensors to detect and mitigate voltage and clock glitches and protect sensitive information or software contained on the device.
CWE-1248Semiconductor Defects in Hardware Logic with Security-Sensitive ImplicationsThe security-sensitive hardware module contains semiconductor defects.
CWE-1255Comparison Logic is Vulnerable to Power Side-Channel AttacksA device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.
CWE-1256Improper Restriction of Software Interfaces to Hardware FeaturesThe product provides software-controllable device functionality for capabilities such as power and clock management, but it does not properly limit functionality that can lead to modification of hardware memory or register bits, or the ability to observe physical side channels.
CWE-1271Uninitialized Value on Reset for Registers Holding Security SettingsSecurity-critical logic is not set to a known value on reset.
CWE-1304Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore OperationThe product performs a power save/restore operation, but it does not ensure that the integrity of the configuration state is maintained and/or verified between the beginning and ending of the operation.
CWE-1314Missing Write Protection for Parametric Data ValuesThe device does not write-protect the parametric data values for sensors that scale the sensor value, allowing untrusted software to manipulate the apparent result and potentially damage hardware or cause operational failure.
CWE-1320Improper Protection for Outbound Error Messages and Alert SignalsUntrusted agents can disable alerts about signal conditions exceeding limits or the response mechanism that handles such alerts.
CWE-1332Improper Handling of Faults that Lead to Instruction SkipsThe device is missing or incorrectly implements circuitry or sensors that detect and mitigate the skipping of security-critical CPU instructions when they occur.
CWE-1338Improper Protections Against Hardware OverheatingA hardware device is missing or has inadequate protection features to prevent overheating.
CWE-1194Hardware DesignThis view organizes weaknesses around concepts that are frequently used or encountered in hardware design. Accordingly, this view can align closely with the perspectives of designers, manufacturers, educators, and assessment vendors. It provides a variety of categories that are intended to simplify navigation, browsing, and mapping.
Vulnerability Mapping Notes
Usage: Prohibited
Reasons: Category
Rationale:
This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.
Comment:
See member weaknesses of this category.