This vulnerability occurs when a system's software interfaces to hardware features—like power, clock, or performance management—are not properly locked down. This allows attackers to misuse these interfaces from software to tamper with hardware memory or registers, or to gather sensitive data by observing physical side effects, without needing physical access to the device.
Many developers assume that attacks like fault injection or side-channel analysis require an attacker to physically touch the device. This assumption breaks down when software can directly control hardware features like voltage, clock speed, or power meters. Attackers can exploit these poorly restricted interfaces from a standard application to deliberately cause bit errors (faults) or to measure power consumption patterns, leading to privilege escalation, authentication bypass, or cryptographic key extraction. Common examples include abusing dynamic voltage and frequency scaling (DVFS) to induce faults, using hardware power meters (e.g., Intel RAPL) for side-channel analysis, or triggering Rowhammer-style bit flips via rapid memory accesses. Managing this at scale is difficult; an ASPM like Plexicus can help you track and remediate these hardware-interface flaws across your entire stack, correlating code patterns with potential runtime exploitation.
Impact: Modify MemoryModify Application DataBypass Protection Mechanism
Continuously writing the same value to the same address causes the value of an adjacent location to change value.
Redesign the RAM devices to reduce inter capacitive coupling making the Rowhammer exploit impossible.