This vulnerability occurs when a hardware fabric endpoint is incorrectly configured to grant bus controller privileges to a device that should only respond to requests. This allows an unauthorized device to initiate and control data transactions across the system bus.
Many modern system-on-chip (SoC) designs use reusable fabric endpoints with a configurable control bit. This bit determines whether a connected IP block (like a peripheral) can act only as a responder to requests, or if it can also act as a controller, initiating transactions to access other system components. While this flexibility aids hardware reuse, it introduces a critical security boundary. If this control bit is enabled by default in the hardware design, or if system firmware or software incorrectly sets it during operation, a peripheral intended to be passive gains unauthorized control over the system fabric. This compromised device can then read from or write to sensitive memory regions or other peripherals, leading to data exposure, privilege escalation, or a complete system takeover.
Impact: Modify MemoryRead MemoryBypass Protection Mechanism