Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1190 — Vulnerability Class 1

1 vulnerabilities classified as CWE-1190. AI Chinese analysis included.

CWE-1190 represents a critical timing vulnerability where a system enables Direct Memory Access (DMA) capable devices before establishing necessary security configurations during the boot phase. This weakness allows attackers to exploit the unprotected window by injecting malicious hardware or using existing peripherals to directly read from or write to system memory, bypassing standard software-based access controls. Consequently, adversaries can extract sensitive data, such as encryption keys or credentials, or escalate privileges to gain full system control. To mitigate this risk, developers must enforce strict initialization sequences that configure DMA controllers with appropriate memory protection and isolation policies before any device is activated. Implementing hardware-based trust anchors and verifying security states early in the boot process ensures that DMA operations are restricted to authorized, secure contexts, thereby preventing unauthorized memory access during the vulnerable startup period.

MITRE CWE Description
The product enables a Direct Memory Access (DMA) capable device before the security configuration settings are established, which allows an attacker to extract data from or gain privileges on the product. DMA is included in a number of devices because it allows data transfer between the computer and the connected device, using direct hardware access to read or write directly to main memory without any OS interaction. An attacker could exploit this to access secrets. Several virtualization-based mitigations have been introduced to thwart DMA attacks. These are usually configured/setup during boot time. However, certain IPs that are powered up before boot is complete (known as early boot IPs) may be DMA capable. Such IPs, if not trusted, could launch DMA attacks and gain access to assets that should otherwise be protected.
Common Consequences (1)
Access ControlBypass Protection Mechanism, Modify Memory
DMA devices have direct write access to main memory and due to time of attack will be able to bypass OS or Bootloader access control.
Mitigations (1)
Architecture and DesignUtilize an IOMMU to orchestrate IO access from the start of the boot process.
CVE IDTitleCVSSSeverityPublished
CVE-2022-22566 Dell Client Commercial 安全漏洞 — CPG BIOS 6.9 Medium2022-02-09

Vulnerabilities classified as CWE-1190 represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.