This vulnerability occurs when a System-on-a-Chip (SoC) fails to properly secure its Security Token mechanism. These tokens control which actions different system components are allowed to perform, but inadequate protection allows them to be manipulated.
Security Tokens act as digital IDs within a System-on-a-Chip, determining what operations each component can execute—such as read, write, program, or reset. Each agent in the system receives one or more tokens based on its trust level and privileges. Since these tokens directly enforce security boundaries, any weakness in their assignment or protection compromises the entire system's integrity. When token assignment isn't properly restricted, malicious agents can reprogram or spoof tokens to impersonate trusted components. This allows attackers to bypass privilege checks and perform unauthorized actions, effectively breaking the hardware's security model. Proper implementation must ensure tokens are immutable and only assignable by trusted system logic.
Impact: Modify Files or DirectoriesExecute Unauthorized Code or CommandsBypass Protection MechanismGain Privileges or Assume IdentityModify MemoryModify MemoryDoS: Crash, Exit, or Restart
The Aux-controller could program its Security Token to "1" from "2".
The SoC needs to protect the Security Tokens. None of the agents in the SoC should have the ability to change the Security Token.