A confused deputy vulnerability occurs when a system receives a request from a client and forwards it to an external destination without properly identifying the original source. This makes the system appear to be the originator of the request, effectively turning it into an unintended proxy for the client.
Attackers exploit this flaw when they cannot reach a target system directly. By sending a malicious request to your vulnerable application, they can have it relayed to the protected target. Since the request now originates from your system's IP address and context, it can bypass network firewalls, IP-based allowlists, and hide the attacker's true location, enabling unauthorized access or actions. This becomes a critical security issue only under specific conditions: your application must have higher privileges or different network access than the initial requester; the attacker must be blocked from contacting the target directly; and the attacker must be able to craft a request that your application forwards unintentionally. This often involves specifying an unexpected host, port, internal IP, or a restricted command within an otherwise permitted service request.
Impact: Gain Privileges or Assume IdentityHide ActivitiesExecute Unauthorized Code or Commands
The code in ring-3 (least trusted ring) of the microcontroller attempts to directly read the protected registers in IP core through MMIO transactions. However, this attempt is blocked due to the implemented access control. Now, the microcontroller configures the DMA core to transfer data from the protected registers to a memory region that it has access to. The DMA core, which is acting as an intermediary in this transaction, does not preserve the identity of the microcontroller and, instead, initiates a new transaction with its own identity. Since the DMA core has access, the transaction (and hence, the attack) is successful.
The DMA core forwards this transaction with the identity of the code executing on the microcontroller, which is the original initiator of the end-to-end transaction. Now the transaction is blocked, as a result of forwarding the identity of the true initiator which lacks the permission to access the confidential MMIO mapped IP core.