This vulnerability occurs when a hardware component (IP block) is wired incorrectly to the main system, creating hidden security flaws even if basic functions appear to work.
For a system-on-chip (SoC) to operate securely, its internal hardware blocks must communicate with the parent system using the correct control and data signals. An incorrect connection—like linking a reset pin to the wrong system controller—can bypass critical security boundaries. While the device might still boot and run, this miswiring opens a backdoor that attackers can exploit to tamper with sensitive data or operations. Consider a block designed to only clear its data during a full system power cycle. If its reset line is mistakenly connected to a software-controlled debug reset, a privileged process or an attacker gaining software access could trigger an unauthorized reset. This violates the hardware's data integrity guarantees, potentially leaking secrets or corrupting secure state, all while the system seems to function normally from a user's perspective.
Impact: Varies by Context
// IP definition module tz_peripheral(clk, reset, data_in, data_in_security_level, ...);
verilog// Instantiation of IP in a parent system module soc(...)
verilog... csr_regfile #(
verilog
.irq_i(),**
verilog
...
... csr_regfile #(
verilog
.irq_i (irq_i),**
verilog
...