6 vulnerabilities classified as CWE-1262. AI Chinese analysis included.
CWE-1262 represents a critical access control weakness where software improperly manages permissions for memory-mapped I/O registers, which serve as the primary interface between software and hardware peripherals in System-on-Chip architectures. This vulnerability typically arises when security-critical registers lack adequate restrictions, allowing malicious or compromised applications to tamper with hardware data directly. Attackers exploit this by reading sensitive configuration states or writing unauthorized commands to modify hardware behavior, potentially bypassing security mechanisms or causing system instability. To prevent such exploits, developers must implement strict access control lists and privilege separation models for register interfaces. This involves ensuring that only trusted, high-privilege components can access sensitive registers, while enforcing hardware-enforced memory protection units to isolate critical hardware functions from untrusted software contexts, thereby maintaining system integrity and confidentiality.
Cryptographic key material stored in registers inside the cryptographic accelerator can be accessed by software.Key material stored in registers should never be accessible to software. Even if software can provide a key, all read-back paths to software should be disabled.if (csr_we || csr_read) begin if ((riscv::priv_lvl_t'(priv_lvl_o & csr_addr.csr_decode.priv_lvl) != csr_addr.csr_decode.priv_lvl) && !(csr_addr.address==riscv::CSR_MEPC)) begin csr_exception_o.cause = riscv::ILLEGAL_INSTR; csr_exception_o.valid = 1'b1; end // check access to debug mode only CSRs if (csr_addr_i[11:4] == 8'h7b && !debug_mode_q) begin csr_exception_o.cause = riscv::ILLEGAL_INSTR; csr_exception_o.valid = 1'b1; end endif (csr_we || csr_read) begin if ((riscv::priv_lvl_t'(priv_lvl_o & csr_addr.csr_decode.priv_lvl) != csr_addr.csr_decode.priv_lvl)) begin csr_exception_o.cause = riscv::ILLEGAL_INSTR; csr_exception_o.valid = 1'b1; end // check access to debug mode only CSRs if (csr_addr_i[11:4] == 8'h7b && !debug_mode_q) begin csr_exception_o.cause = riscv::ILLEGAL_INSTR; csr_exception_o.valid = 1'b1; end end| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-47385 | Improper Access Control for Register Interface in SCE-Mink — Snapdragon | 7.8 | High | 2026-03-02 |
| CVE-2025-36194 | This Power System update is being released to address — PowerVM Hypervisor | 2.8 | Low | 2026-02-02 |
| CVE-2025-20788 | MediaTek Chipsets 安全漏洞 — MT6991, MT8196 | 5.0AI | MediumAI | 2025-12-02 |
| CVE-2023-20599 | AMD EPYC 安全漏洞 — AMD EPYC™ 7002 Series Processors | 7.9 | High | 2025-06-10 |
| CVE-2024-45556 | Improper Access Control for Register Interface in TZ Firmware — Snapdragon | 6.5 | Medium | 2025-04-07 |
| CVE-2025-1882 | i-Drive i11/i12 Device Setting improper access control for register interface — i11 | 5.0 | Medium | 2025-03-03 |
Vulnerabilities classified as CWE-1262 represent 6 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.