This vulnerability occurs when a hardware system uses outdated or deprecated encoding methods to enforce security policies and access controls.
In a System-on-a-Chip (SoC), different hardware components constantly generate transactions to read, write, or perform actions like reset or compute. Each transaction includes identifiers for its source and destination, and is often tagged with a Security Token. This token acts as a key, telling the destination what actions the transaction is permitted to perform. A policy encoder is responsible for creating these tokens by mapping transaction details to specific security permissions. A critical security flaw arises when this policy encoder relies on an obsolete or no-longer-trusted encoding scheme. Using weak or deprecated encoding undermines the entire access control system, as the security tokens can become predictable, forgeable, or easily bypassed. This leaves the chip's assets and functions vulnerable to unauthorized access or manipulation by malicious actors.
Impact: Modify MemoryRead MemoryModify Files or DirectoriesRead Files or DirectoriesDoS: Resource Consumption (Other)Execute Unauthorized Code or CommandsGain Privileges or Assume IdentityBypass Protection MechanismReduce Reliability
Effectiveness: High
bashbash