68 vulnerabilities classified as CWE-1220. AI Chinese analysis included.
CWE-1220 represents a critical access control weakness where security policies are implemented with insufficient granularity, resulting in overly broad permissions that fail to restrict unauthorized access to sensitive assets. This vulnerability typically arises when developers apply coarse-grained controls, such as granting read or write access to entire directories or device groups rather than specific files or components. Attackers exploit this by leveraging legitimate but excessive privileges to access or modify security-sensitive data that should remain isolated. In integrated circuits, this might manifest as allowing a low-privilege processor core to access high-security memory regions intended for cryptographic keys. To mitigate this risk, developers must adopt the principle of least privilege, ensuring that access rights are assigned at the most specific level necessary for functionality. Rigorous code reviews and automated static analysis tools can help identify overly permissive configurations before deployment, thereby enforcing strict boundaries between trusted and untrusted agents within the system architecture.
Register Field description AES_ENC_DEC_KEY_0 AES key [0:31] for encryption or decryption Default 0x00000000 AES_ENC_DEC_KEY_1 AES key [32:63] for encryption or decryption Default 0x00000000 AES_ENC_DEC_KEY_2 AES key [64:95] for encryption or decryption Default 0x00000000 AES_ENC_DEC_KEY_4 AES key [96:127] for encryption or decryption Default 0x00000000 AES_KEY_READ_WRITE_POLICY [31:0] Default 0x00000006 - meaning agent with identities "1" and "2" can both read from and write to key registersAES_KEY_READ_POLICY [31:0] Default 0x00000002 - meaning only Crypto engine with identity "1" can read registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3 AES_KEY_WRITE_POLICY [31:0] Default 0x00000004 - meaning only trusted firmware with identity "2" can program registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3... for (i=0; i<NB_SUBORDINATE; i++) begin for (j=0; j<NB_MANAGER; j++) begin assign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i] || ((j==6) && access_ctrl_i[i][7][priv_lvl_i]); end end ...... for (i=0; i<NB_SUBORDINATE; i++) begin for (j=0; j<NB_MANAGER; j++) begin assign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i]; end end ...Vulnerabilities classified as CWE-1220 represent 68 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.