This vulnerability occurs when a product depends on a component that cannot be updated or patched to fix security flaws or critical bugs.
When a vulnerability is discovered in an un-updatable component, product owners are left with no practical way to secure their systems. The only recourse is often a complete replacement, which can be prohibitively expensive or operationally disruptive. This leaves the product permanently exposed to attacks or failures. This is a common and severe issue with hardware like ROM chips, firmware, and embedded systems, which historically lack update mechanisms. Software is not immune, as it can rely on outdated, unsupported third-party libraries or drivers that are essential for functionality but no longer maintained. In critical sectors like healthcare, legacy devices may operate for decades, creating vast attack surfaces with known vulnerabilities and no modern defenses. This reliance on frozen-in-time components creates long-term, unmanageable risk.
Impact: Gain Privileges or Assume IdentityBypass Protection MechanismExecute Unauthorized Code or CommandsDoS: Crash, Exit, or RestartQuality DegradationReduce Maintainability
If an attacker can identify an exploitable vulnerability in one product that has no means of patching, the attack may be used against all affected versions of that product.
Effectiveness: Moderate
The refrigerator has no means of patching and is hacked becoming a spewer of email spam.
The device automatically patches itself and provides considerable more protection against being hacked.
module dmi_jtag(...)(...); ...
verilog
.key_i(256'h24e6fa2254c2ff632a41b...),** ...
verilogmodule dmi_jtag(... ) (
input logic [255:0] hmac_key_i,**
verilog
...
verilog
if (hmac_patch_en)**
verilog
verilog
verilog
verilog