Unauthorized Error Injection Can Degrade Hardware Redundancy

Draft Base
Structure: Simple
Description

This vulnerability occurs when an attacker without proper permissions can deliberately inject faults into a hardware system's backup components. This action disables the redundancy, forcing the system into a less secure, degraded state.

Extended Description

Hardware designers often add duplicate components, like backup processors or memory channels, to maintain system performance and reliability if a primary part fails. This vulnerability undermines that safety net by allowing an unauthorized user or process to inject errors into these backup blocks, corrupting them and making the redundant path unusable. Once the redundancy is compromised, the system is forced to operate in a degraded mode with reduced fault tolerance. This weakened state is often the primary goal of the attack, as it makes the entire system more susceptible to follow-up exploits that could cause complete failure or data corruption.

Common Consequences 1
Scope: IntegrityAvailability

Impact: DoS: Crash, Exit, or RestartDoS: InstabilityQuality DegradationDoS: Resource Consumption (CPU)DoS: Resource Consumption (Memory)DoS: Resource Consumption (Other)Reduce PerformanceReduce ReliabilityUnexpected State

Potential Mitigations 3
Phase: Architecture and Design
Ensure the design does not allow error injection in modes intended for normal run-time operation. Provide access controls on interfaces for injecting errors.
Phase: Implementation
Disallow error injection in modes which are expected to be used for normal run-time operation. Provide access controls on interfaces for injecting errors.
Phase: Integration
Add an access control layer atop any unprotected interfaces for injecting errors.
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Technologies:
Not Technology-Specific : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Integration
Related Weaknesses