This vulnerability occurs when an attacker without proper permissions can deliberately inject faults into a hardware system's backup components. This action disables the redundancy, forcing the system into a less secure, degraded state.
Hardware designers often add duplicate components, like backup processors or memory channels, to maintain system performance and reliability if a primary part fails. This vulnerability undermines that safety net by allowing an unauthorized user or process to inject errors into these backup blocks, corrupting them and making the redundant path unusable. Once the redundancy is compromised, the system is forced to operate in a degraded mode with reduced fault tolerance. This weakened state is often the primary goal of the attack, as it makes the entire system more susceptible to follow-up exploits that could cause complete failure or data corruption.
Impact: DoS: Crash, Exit, or RestartDoS: InstabilityQuality DegradationDoS: Resource Consumption (CPU)DoS: Resource Consumption (Memory)DoS: Resource Consumption (Other)Reduce PerformanceReduce ReliabilityUnexpected State