CWE-1300: Improper Protection of Physical Side Channels

Base Stable Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The device does not contain sufficient protection mechanisms to prevent physical side channels from exposing sensitive information due to patterns in physically observable phenomena such as variations in power consumption, electromagnetic emissions (EME), or acoustic emissions.

常见后果

影响范围: Confidentiality

技术影响: Read Memory Read Application Data

潜在缓解措施

阶段: Architecture and Design

描述: Apply blinding or masking techniques to implementations of cryptographic algorithms.

阶段: Implementation

描述: Add shielding or tamper-resistant protections to the device to increase the difficulty of obtaining measurements of the side-channel.

检测方法

方法: Manual Analysis

Perform a set of leakage detection tests such as the procedure outlined in the Test Vector Leakage Assessment (TVLA) test requirements for AES [REF-1230]. TVLA is the basis for the ISO standard 17825 [REF-1229]. A separate methodology is provided by [REF-1228]. Note that sole reliance on this method might not yield expected results [REF-1239] [REF-1240].

有效性: Moderate

方法: Manual Analysis

有效性: Moderate

方法: Manual Analysis

有效性: Moderate

观察示例

参考: CVE-2022-35888

Power side-channels leak secret information from processor

参考: CVE-2021-3011

electromagnetic-wave side-channel in security-related microcontrollers allows extraction of private key

参考: CVE-2019-14353

Crypto hardware wallet's power consumption relates to total number of pixels illuminated, creating a side channel in the USB connection that allows attackers to determine secrets displayed such as PIN numbers and passwords

参考: CVE-2020-27211

Chain: microcontroller system-on-chip contains uses a register value stored in flash to set product protection state on the memory bus but does not contain protection against fault injection (CWE-1319), which leads to an incorrect initialization of the memory bus (CWE-1419) leading the product to be in an unprotected state.

参考: CVE-2013-4576

message encryption software uses certain instruction sequences that allows RSA key extraction using a chosen-ciphertext attack and acoustic cryptanalysis

参考: CVE-2020-28368

virtualization product allows recovery of AES keys from the guest OS using a side channel attack against a power/energy monitoring interface.

参考: CVE-2019-18673

power consumption varies based on number of pixels being illuminated in a display, allowing reading of secrets such as the PIN by using the USB interface to measure power consumption

引入模式

阶段 说明
Implementation -

适用平台

编程语言
Not Language-Specific (Undetermined)
操作系统
Not OS-Specific (Undetermined)
技术
Not Technology-Specific (Undetermined)
关键信息

CWE ID: CWE-1300

抽象级别: Base

结构: Simple

状态: Stable

相关弱点
相关攻击模式
CAPEC-189 CAPEC-699