This vulnerability occurs when hardware includes test or debug features that remain accessible during normal operation. An attacker can activate these features at runtime to alter the hardware's state, bypass security controls, and potentially leak or manipulate sensitive data.
Attackers exploit this weakness by accessing hardware test modes—like debug interfaces or error injection circuits—that were intended only for development or manufacturing. Once activated, these features can grant unauthorized read/write access to system memory, registers, or buses, allowing an adversary to directly modify the device's behavior or extract secrets. For example, an accessible debug mode might let an attacker intercept or alter data on a communication bus, leading to malicious message injection. Similarly, runtime error injection could corrupt cryptographic operations or expose keys. These capabilities effectively create backdoors that compromise both system integrity and data confidentiality.
Impact: Modify MemoryRead MemoryDoS: Crash, Exit, or RestartDoS: InstabilityDoS: Resource Consumption (CPU)DoS: Resource Consumption (Memory)DoS: Resource Consumption (Other)Execute Unauthorized Code or CommandsGain Privileges or Assume IdentityBypass Protection MechanismAlter Execution LogicQuality DegradationUnexpected StateReduce PerformanceReduce Reliability