1 vulnerabilities classified as CWE-1272. AI Chinese analysis included.
CWE-1272 represents a critical data exposure weakness where systems fail to sanitize sensitive information during transitions between power or debug states. This vulnerability typically arises when devices enter low-power modes, such as hibernation or deep sleep, or when debug interfaces are activated, leaving confidential data like encryption keys or user credentials lingering in volatile memory. Attackers exploit this by physically accessing the device during these states or utilizing specialized hardware tools to dump memory contents before the system fully powers down or resets. To mitigate this risk, developers must implement rigorous memory clearing protocols that overwrite sensitive data immediately prior to any state change. Additionally, employing hardware-enforced memory protection mechanisms and ensuring that debug ports are strictly disabled in production builds can prevent unauthorized access to residual data, thereby maintaining confidentiality across all operational and maintenance phases.
During the transition from A to B, the device does not scrub the memory.For transition from state A to state B, remove information which should not be available once the transition is complete.| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-41967 | Gallagher Controller 6000 安全漏洞 — Controller 6000 | 2.4 | Low | 2023-12-18 |
Vulnerabilities classified as CWE-1272 represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.