Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1253 — Vulnerability Class 1

1 vulnerabilities classified as CWE-1253. AI Chinese analysis included.

CWE-1253 is a hardware security weakness where developers incorrectly select fuse values, compromising the integrity of secure system states. This vulnerability typically arises when security logic depends on a fuse remaining unblown to indicate a secure configuration, yet the implementation fails to properly account for the irreversible nature of blown fuses. Attackers may exploit this by manipulating the physical state of the fuse or bypassing the hardware checks, effectively forcing the system into an insecure mode or exposing sensitive configuration data stored within the fuse structure. To mitigate this risk, developers must rigorously validate fuse selection during the design phase, ensuring that critical security mechanisms do not rely solely on the initial state of one-time programmable memory. Implementing redundant hardware checks and utilizing tamper-resistant packaging further strengthens the system against physical tampering and unauthorized state changes.

MITRE CWE Description
The logic level used to set a system to a secure state relies on a fuse being unblown. Fuses are often used to store secret data, including security configuration data. When not blown, a fuse is considered to store a logic 0, and, when blown, it indicates a logic 1. Fuses are generally considered to be one-directional, i.e., once blown to logic 1, it cannot be reset to logic 0.
Common Consequences (4)
Access Control, AuthorizationBypass Protection Mechanism, Gain Privileges or Assume Identity
If the logic used to determine system-security state (by leveraging the values sensed from the fuses) uses negative logic, an attacker might blow the fuse and drive the system to an insecure state.
AvailabilityDoS: Crash, Exit, or Restart
ConfidentialityRead Memory
IntegrityModify Memory, Execute Unauthorized Code or Commands
Mitigations (1)
Architecture and DesignLogic should be designed in a way that blown fuses do not put the product into an insecure state that can be leveraged by an attacker.
Examples (1)
A chip implements a secure boot and uses the sensed value of a fuse "do_secure_boot" to determine whether to perform a secure boot or not. If this fuse value is "0", the system performs secure boot. Otherwise, it does not perform secure boot. An attacker blows the "do_secure_boot" fuse to "1". After reset, the attacker loads a custom bootloader, and, since t…
CVE IDTitleCVSSSeverityPublished
CVE-2023-6355 Gallagher Controller 7000 安全漏洞 — Controller 7000 6.8 Medium2023-12-18

Vulnerabilities classified as CWE-1253 represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.