This vulnerability occurs when a hardware lock bit, designed to protect critical system configuration registers, is improperly reset or becomes programmable after a device transitions between power states, such as entering or waking from a low-power sleep mode. This allows the protected configuration to be altered after it should be permanently locked.
Many hardware systems use a programmable lock bit to secure configuration settings. A trusted agent like the BIOS or bootloader sets this bit after initial configuration, which should permanently prevent further writes to sensitive registers. However, if this lock is cleared or the protected registers are reset when the device wakes from a sleep state or undergoes another power transition, the intended security mechanism fails. This flaw exposes the system to post-boot attacks where malicious software can alter low-level device settings that control memory, peripherals, or security features. Developers must verify that lock bit states and protected register values are preserved consistently across all designed power state transitions, including sleep, hibernation, and warm resets, to ensure runtime integrity.
Impact: Modify Memory
Effectiveness: High
module reglk_wrapper #( ...
verilog
reglk_mem[j] <= 'h0;** end end ...
module reglk_wrapper #( ...
verilog
reglk_mem[j] <= 'hffffffff;** end end ...