Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1272 — Vulnerability Class 1

1 vulnerabilities classified as CWE-1272. AI Chinese analysis included.

CWE-1272 represents a critical data exposure weakness where systems fail to sanitize sensitive information during transitions between power or debug states. This vulnerability typically arises when devices enter low-power modes, such as hibernation or deep sleep, or when debug interfaces are activated, leaving confidential data like encryption keys or user credentials lingering in volatile memory. Attackers exploit this by physically accessing the device during these states or utilizing specialized hardware tools to dump memory contents before the system fully powers down or resets. To mitigate this risk, developers must implement rigorous memory clearing protocols that overwrite sensitive data immediately prior to any state change. Additionally, employing hardware-enforced memory protection mechanisms and ensuring that debug ports are strictly disabled in production builds can prevent unauthorized access to residual data, thereby maintaining confidentiality across all operational and maintenance phases.

MITRE CWE Description
The product performs a power or debug state transition, but it does not clear sensitive information that should no longer be accessible due to changes to information access restrictions. A device or system frequently employs many power and sleep states during its normal operation (e.g., normal power, additional power, low power, hibernate, deep sleep, etc.). A device also may be operating within a debug condition. State transitions can happen from one power or debug state to another. If there is information available in the previous state which should not be available in the next state and is not properly removed before the transition into the next state, sensitive information may leak from the system.
Common Consequences (1)
Confidentiality, Integrity, Availability, Access Control, Accountability, Authentication, Authorization, Non-RepudiationRead Memory, Read Application Data
Sensitive information may be used to unlock additional capabilities of the device and take advantage of hidden functionalities which could be used to compromise device security.
Mitigations (1)
Architecture and Design, ImplementationDuring state transitions, information not needed in the next state should be removed before the transition to the next state.
Examples (1)
This example shows how an attacker can take advantage of an incorrect state transition.
During the transition from A to B, the device does not scrub the memory.
Bad · Other
For transition from state A to state B, remove information which should not be available once the transition is complete.
Good · Other
CVE IDTitleCVSSSeverityPublished
CVE-2023-41967 Gallagher Controller 6000 安全漏洞 — Controller 6000 2.4 Low2023-12-18

Vulnerabilities classified as CWE-1272 represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.