CWE-1255: Comparison Logic is Vulnerable to Power Side-Channel Attacks

Variant Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.

常见后果

影响范围: Confidentiality Integrity Availability Access Control Accountability Authentication Authorization Non-Repudiation

技术影响: Modify Memory Read Memory Read Files or Directories Modify Files or Directories Execute Unauthorized Code or Commands Gain Privileges or Assume Identity Bypass Protection Mechanism Read Application Data Modify Application Data Hide Activities

说明: As compromising a security token may result in complete system control, the impacts are relatively universal.

潜在缓解措施

阶段: Architecture and Design

描述: The design phase must consider each check of a security token against a standard and the amount of power consumed during the check of a good token versus a bad token. The alternative is an all at once check where a retry counter is incremented PRIOR to the check.

阶段: Architecture and Design

描述: Another potential mitigation is to parallelize shifting of secret data (see example 2 below). Note that the wider the bus the more effective the result.

阶段: Architecture and Design

描述: An additional potential mitigation is to add random data to each crypto operation then subtract it out afterwards. This is highly effective but costly in performance, area, and power consumption. It also requires a random number generator.

阶段: Implementation

描述: If the architecture is unable to prevent the attack, using filtering components may reduce the ability to implement an attack, however, consideration must be given to the physical removal of the filter elements.

阶段: Integration

描述: During integration, avoid use of a single secret for an extended period (e.g. frequent key updates). This limits the amount of data compromised but at the cost of complexity of use.

观察示例

参考: CVE-2020-12788

CMAC verification vulnerable to timing and power attacks.

引入模式

阶段 说明
Architecture and Design The design of the algorithm itself may intrinsically allow the power side channel attack to be effective
Implementation This weakness may be introduced during implementation despite a robust design that otherwise prevents exploitation

适用平台

编程语言
Not Language-Specific (Undetermined)
操作系统
Not OS-Specific (Undetermined)
技术
Not Technology-Specific (Undetermined)
关键信息

CWE ID: CWE-1255

抽象级别: Variant

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-189