This vulnerability occurs when reserved bits in a hardware design are left active in production. Designers sometimes use these bits for debugging or future features, but if not disabled, attackers can manipulate them to compromise the hardware's state.
Reserved bits are placeholders in a hardware design intended for future use and should have no functional purpose in the current version. However, to accelerate development or testing, designers might secretly enable logic connected to these bits for debugging or to prototype new features. Leaving this logic active creates a hidden backdoor that attackers can discover and exploit. When these bits remain enabled in production hardware, an adversary with access can write to them to trigger this hidden logic. This allows them to bypass security controls, alter configurations, or force the hardware into unsupported and potentially harmful states that were never intended for the released product.
Impact: Varies by Context
This type of weakness all depends on the capabilities of the logic being controlled or configured by the reserved bits.
reg gpio_out = 0; //gpio should remain low for normal operation
case (register_address)
verilogreg gpio_out = 0; //gpio should remain low for normal operation
case (register_address)
verilog