This vulnerability occurs when a hardware device lacks or incorrectly implements the necessary circuitry or sensors to detect and respond to the skipping of critical security instructions during CPU execution.
Hardware can behave unpredictably under certain operating conditions, such as during electrical disturbances or when pushed beyond its normal specifications. These conditions can cause the CPU to skip crucial security instructions, effectively bypassing the logic they were meant to enforce. In practice, this often targets single conditional branch instructions that control security decisions—like password verification or firmware authentication—flipping the intended outcome if skipped. Attackers exploit this by using fault injection techniques to deliberately induce these unstable operating conditions, making instruction skips happen more reliably and frequently than they would naturally. This allows them to manipulate security-critical decision points, such as bypassing authentication checks or altering firmware validation processes.
Impact: Bypass Protection MechanismAlter Execution LogicUnexpected State
Depending on the context, instruction skipping can have a broad range of consequences related to the generic bypassing of security critical code.
The card emits the credentials when a voltage anomaly is injected into the power line to the device at a particular time after providing an incorrect PIN to the card, causing the internal program to accept the incorrect PIN.
add an internal filter or internal power supply in series with the power supply pin on the device
add sensing circuitry to reset the device if out of tolerance conditions are detected
add additional execution sensing circuits to monitor the execution order for anomalies and abort the action or reset the device under fault conditions