This vulnerability occurs when a system's security token mechanism, designed to control permissions for different entities or agents, generates tokens that are fundamentally flawed or incorrect.
In Systems-on-a-Chip (SoC) and similar hardware, security tokens act as digital IDs that define what actions (like read, write, or reset) each hardware agent is allowed to perform. These tokens are assigned based on an agent's trust level. If the token generation logic is broken, it can assign duplicate tokens to multiple agents or assign multiple conflicting tokens to a single agent. This flawed assignment breaks the fundamental security model. It can lead to severe consequences, including system crashes (Denial-of-Service), privilege escalation where a low-trust agent gains high-level access, or unauthorized actions that compromise the entire chip's security and data integrity.
Impact: Modify Files or DirectoriesExecute Unauthorized Code or CommandsBypass Protection MechanismGain Privileges or Assume IdentityRead MemoryModify MemoryDoS: Crash, Exit, or Restart
The SoC incorrectly generates Security Token "1" for every agent. In other words, both Main-controller and Aux-controller are assigned Security Token "1".
The SoC should correctly generate Security Tokens, assigning "1" to the Main-controller and "2" to the Aux-controller