The product's hardware-enforced access control for a particular resource improperly accounts for privilege discrepancies between control and write policies.
Integrated circuits and hardware engines may provide access to resources (device-configuration, encryption keys, etc.) belonging to trusted firmware or software modules (commonly set by a BIOS or a bootloader). These accesses are typically controlled and limited by the hardware. Hardware design access control is sometimes implemented using a policy. A policy defines which entity or agent may or may not be allowed to perform an action. When a system implements multiple levels of policies, a control policy may allow direct access to a resource as well as changes to the policies themselves. Resources that include agents in their control policy but not in their write policy could unintentionally allow an untrusted agent to insert itself in the write policy register. Inclusion in the write policy register could allow a malicious or misbehaving agent write access to resources. This action could result in security compromises including leaked information, leaked encryption keys, or modification of device configuration.
Impact: Modify MemoryRead MemoryDoS: Crash, Exit, or RestartExecute Unauthorized Code or CommandsGain Privileges or Assume IdentityBypass Protection MechanismRead Files or DirectoriesReduce Reliability
| Register | Field description |
|---|---|
| AES_KEY_CONTROL_POLICY | Controls which agents can write to READ_POLICY and WRITE_POLICY registers [31:0] Default 0x00000018 |
| AES_KEY_READ_POLICY | Controls which agents can read the AES-key registers [31:0] Default 0x00000002 |
| AES_KEY_WRITE_POLICY | Controls which agents can write to the AES-key registers [31:0] Default 0x00000004 |
| Register | Field description |
|---|---|
| AES_KEY_CONTROL_POLICY | [31:0] Default 0x00000010 |
| AES_KEY_READ_POLICY | [31:0] Default 0x00000002 |
| AES_KEY_WRITE_POLICY | [31:0] Default 0x00000004 |