A system or System-on-Chip (SoC) lacks a mechanism to update its initial boot code stored in Read-Only Memory (ROM), permanently exposing devices to unfixable security vulnerabilities.
Many secure systems start by running foundational code from an immutable ROM, which establishes a hardware Root of Trust. Since this ROM code is permanently etched into the chip during manufacturing, any security flaws discovered after the device ships become permanent. This creates a critical, unchangeable weakness in every deployed unit. Without a built-in patching capability for this ROM stage, the entire system remains vulnerable to exploitation. Attackers can target these unfixable flaws to compromise the boot process, potentially bypassing all subsequent security layers and taking full control of the SoC.
Impact: Varies by ContextReduce Maintainability
When the system is unable to be patched, it can be left in a vulnerable state.
Effectiveness: Moderate
Effectiveness: Moderate
...
verilog
assign rom_rdata = (ariane_boot_sel_i) ? rom_rdata_linux : rom_rdata_linux;** ...
...
verilog
assign rom_rdata = (ariane_boot_sel_i) ? rom_rdata_patch : rom_rdata_linux;** ...