CWE-1247: Improper Protection Against Voltage and Clock Glitches
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The device does not contain or contains incorrectly implemented circuitry or sensors to detect and mitigate voltage and clock glitches and protect sensitive information or software contained on the device.
常见后果
影响范围: Confidentiality Integrity Availability Access Control
技术影响: Gain Privileges or Assume Identity Bypass Protection Mechanism Read Memory Modify Memory Execute Unauthorized Code or Commands
潜在缓解措施
阶段: Architecture and Design Implementation
检测方法
方法: Manual Analysis
有效性: Moderate
方法: Dynamic Analysis with Manual Results Interpretation
During the implementation phase where actual hardware is available, specialized hardware tools and apparatus such as ChipWhisperer may be used to check if the platform is indeed susceptible to voltage and clock glitching attacks.
方法: Architecture or Design Review
Review if the protections against glitching merely transfer the attack target. For example, suppose a critical authentication routine that an attacker would want to bypass is given the protection of modifying certain artifacts from within that specific routine (so that if the routine is bypassed, one can examine the artifacts and figure out that an attack must have happened). However, if the attacker has the ability to bypass the critical authentication routine, they might also have the ability to bypass the other protection routine that checks the artifacts. Basically, depending on these kind of protections is akin to resorting to "Security by Obscurity".
方法: Architecture or Design Review
Many SoCs come equipped with a built-in Dynamic Voltage and Frequency Scaling (DVFS) that can control the voltage and clocks via software alone. However, there have been demonstrated attacks (like Plundervolt and CLKSCREW) that target this DVFS [REF-1081] [REF-1082]. During the design and implementation phases, one needs to check if the interface to this power management feature is available from unprivileged SW (CWE-1256), which would make the attack very easy.
观察示例
参考: CVE-2019-17391
Lack of anti-glitch protections allows an attacker to launch a physical attack to bypass the secure boot and read protected eFuses.
参考: CVE-2021-33478
IP communication firmware allows access to a boot shell via certain impulses
引入模式
| 阶段 | 说明 |
|---|---|
| Operation | - |