This vulnerability occurs when a hardware decoder incorrectly interprets security identifiers in bus transactions, allowing untrusted agents to gain unauthorized access to protected assets.
In a System-on-Chip (SoC), hardware components communicate through bus transactions that include security identifiers. These identifiers determine what actions an agent can perform—like reading, writing, or controlling a resource. A decoder maps these identifiers to specific access privileges. If this decoding logic is flawed, the system's fundamental access control can be bypassed. The core risk arises when the decoder mistakenly maps an untrusted agent's identifier to a trusted one's privileges. This error effectively promotes an unauthorized agent's access level, letting it interact with assets it shouldn't. Developers must ensure the decoding logic is rigorously verified to prevent such privilege escalation in hardware security mechanisms.
Impact: Modify MemoryRead MemoryDoS: Resource Consumption (Other)Execute Unauthorized Code or CommandsGain Privileges or Assume IdentityQuality Degradation
otherotherother