The Most Dangerous Hardware Weaknesses, MITRE

Share post:

The non-profit organization MITRE has published a list of the most dangerous vulnerabilities in programming, design, and architecture that will affect hardware in 2021. These weaknesses are found in hardware programming and design leading to exploitable vulnerabilities and exposing systems to cyberattacks.

This list is the result of the joint work of the organization within the Hardware CWE Special Interest Group (SIG), a group of professionals from hardware design, manufacturing, research, security, academia and government.

The following list gives an insight into the ten most dangerous hardware security vulnerabilities out of 96 hardware entries in the CWE corpus.

CWE-1189Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
CWE-1191On-Chip Debug and Test Interface With Improper Access Control
CWE-1231Improper Prevention of Lock Bit Modification
CWE-1233Security-Sensitive Hardware Controls with Missing Lock Bit Protection
CWE-1240Use of a Cryptographic Primitive with a Risky Implementation
CWE-1244Internal Asset Exposed to Unsafe Debug Access Level or State
CWE-1256Improper Restriction of Software Interfaces to Hardware Features
CWE-1260Improper Handling of Overlap Between Protected Memory Ranges
CWE-1272Sensitive Information Uncleared Before Debug/Power State Transition
CWE-1274Improper Access Control for Volatile Memory Containing Boot Code
CWE-1277Firmware Not Updateable
CWE-1300Improper Protection of Physical Side Channels

The list also aims to prevent hardware security problems at the source by educating programmers and designers on how to eliminate critical bugs early in the product development lifecycle.

In addition, test engineers and safety analysts may also consider the list useful in preparing for safety tests and evaluation plans.

For more information, read the original story in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways