CWE-1247: Improper Protection Against Voltage and Clock Glitches

Base Stable Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The device does not contain or contains incorrectly implemented circuitry or sensors to detect and mitigate voltage and clock glitches and protect sensitive information or software contained on the device.

常见后果

影响范围: Confidentiality Integrity Availability Access Control

技术影响: Gain Privileges or Assume Identity Bypass Protection Mechanism Read Memory Modify Memory Execute Unauthorized Code or Commands

潜在缓解措施

阶段: Architecture and Design Implementation

检测方法

方法: Manual Analysis

有效性: Moderate

方法: Dynamic Analysis with Manual Results Interpretation

During the implementation phase where actual hardware is available, specialized hardware tools and apparatus such as ChipWhisperer may be used to check if the platform is indeed susceptible to voltage and clock glitching attacks.

方法: Architecture or Design Review

Review if the protections against glitching merely transfer the attack target. For example, suppose a critical authentication routine that an attacker would want to bypass is given the protection of modifying certain artifacts from within that specific routine (so that if the routine is bypassed, one can examine the artifacts and figure out that an attack must have happened). However, if the attacker has the ability to bypass the critical authentication routine, they might also have the ability to bypass the other protection routine that checks the artifacts. Basically, depending on these kind of protections is akin to resorting to "Security by Obscurity".

方法: Architecture or Design Review

Many SoCs come equipped with a built-in Dynamic Voltage and Frequency Scaling (DVFS) that can control the voltage and clocks via software alone. However, there have been demonstrated attacks (like Plundervolt and CLKSCREW) that target this DVFS [REF-1081] [REF-1082]. During the design and implementation phases, one needs to check if the interface to this power management feature is available from unprivileged SW (CWE-1256), which would make the attack very easy.

观察示例

参考: CVE-2019-17391

Lack of anti-glitch protections allows an attacker to launch a physical attack to bypass the secure boot and read protected eFuses.

参考: CVE-2021-33478

IP communication firmware allows access to a boot shell via certain impulses

引入模式

阶段 说明
Operation -

适用平台

编程语言
Not Language-Specific (Undetermined)
操作系统
Not OS-Specific (Undetermined)
技术
ICS/OT (Undetermined) System on Chip (Undetermined) Power Management Hardware (Undetermined) Clock/Counter Hardware (Undetermined) Sensor Hardware (Undetermined)
关键信息

CWE ID: CWE-1247

抽象级别: Base

结构: Simple

状态: Stable

相关弱点
相关攻击模式
CAPEC-624 CAPEC-625