Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1270 — Vulnerability Class 3

3 vulnerabilities classified as CWE-1270. AI Chinese analysis included.

CWE-1270 represents a critical implementation flaw where systems generate invalid or predictable security tokens, failing to properly authenticate or authorize actions originating from various agents. This weakness typically allows attackers to bypass access controls by forging, replaying, or manipulating these tokens to execute unauthorized transactions or escalate privileges within the system. In hardware contexts like Systems-On-a-Chip, such flaws can lead to severe integrity violations across integrated circuits. Developers mitigate this risk by employing robust cryptographic algorithms with sufficient entropy, ensuring tokens are unique, non-predictable, and securely bound to specific sessions or entities. Regular security audits and rigorous testing of token generation logic are essential to verify that tokens remain distinct and resistant to forgery, thereby maintaining the integrity of the authentication mechanism and preventing unauthorized system access.

MITRE CWE Description
The product implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens generated in the system are incorrect. Systems-On-a-Chip (SoC) (Integrated circuits and hardware engines) implement Security Tokens to differentiate and identify actions originated from various agents. These actions could be "read", "write", "program", "reset", "fetch", "compute", etc. Security Tokens are generated and assigned to every agent on the SoC that is either capable of generating an action or receiving an action from another agent. Every agent could be assigned a unique, Security Token based on its trust level or privileges.
Common Consequences (1)
Confidentiality, Integrity, Availability, Access ControlModify Files or Directories, Execute Unauthorized Code or Commands, Bypass Protection Mechanism, Gain Privileges or Assume Identity, Read Memory, Modify Memory, DoS: Crash, Exit, or Restart
Incorrectly generated Security Tokens could result in the same token used for multiple agents or multiple tokens being used for the same agent. This condition could result in a Denial-of-Service (DoS) or the execution of an action that in turn could result in privilege escalation or unintended acces…
Mitigations (1)
Architecture and Design, ImplementationGeneration of Security Tokens should be reviewed for design inconsistency and common weaknesses. Security-Token definition and programming flow should be tested in pre-silicon and post-silicon testing.
Examples (1)
Consider a system with a register for storing an AES key for encryption or decryption. The key is 128 bits long implemented as a set of four 32-bit registers. The key registers are assets, and register, AES_KEY_ACCESS_POLICY, is defined to provide necessary access controls. The access-policy register defines which agents, using a Security Token, may access the AES-key registers. Each bit in this 3…
The SoC incorrectly generates Security Token "1" for every agent. In other words, both Main-controller and Aux-controller are assigned Security Token "1".
Bad · Other
The SoC should correctly generate Security Tokens, assigning "1" to the Main-controller and "2" to the Aux-controller
Good · Other

Vulnerabilities classified as CWE-1270 represent 3 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.