CWE-1259: Improper Restriction of Security Token Assignment

Base Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The System-On-A-Chip (SoC) implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens are improperly protected.

扩展描述

Systems-On-A-Chip (Integrated circuits and hardware engines) implement Security Tokens to differentiate and identify which actions originated from which agent. These actions may be one of the directives: 'read', 'write', 'program', 'reset', 'fetch', 'compute', etc. Security Tokens are assigned to every agent in the System that is capable of generating an action or receiving an action from another agent. Multiple Security Tokens may be assigned to an agent and may be unique based on the agent's trust level or allowed privileges. Since the Security Tokens are integral for the maintenance of security in an SoC, they need to be protected properly. A common weakness afflicting Security Tokens is improperly restricting the assignment to trusted components. Consequently, an improperly protected Security Token may be able to be programmed by a malicious agent (i.e., the Security Token is mutable) to spoof the action as if it originated from a trusted agent.

常见后果

影响范围: Confidentiality Integrity Availability Access Control

技术影响: Modify Files or Directories Execute Unauthorized Code or Commands Bypass Protection Mechanism Gain Privileges or Assume Identity Modify Memory Modify Memory DoS: Crash, Exit, or Restart

潜在缓解措施

阶段: Architecture and Design Implementation

引入模式

阶段 说明
Architecture and Design -
Implementation -

适用平台

编程语言
Not Language-Specific (Undetermined)
操作系统
Not OS-Specific (Undetermined)
技术
Processor Hardware (Undetermined) System on Chip (Undetermined)
关键信息

CWE ID: CWE-1259

抽象级别: Base

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-121 CAPEC-681