Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1300 — Vulnerability Class 8

8 vulnerabilities classified as CWE-1300. AI Chinese analysis included.

CWE-1300 represents a critical architectural flaw where systems fail to mitigate physical side-channel attacks, leaving sensitive data vulnerable to observation through environmental anomalies. Attackers typically exploit this weakness by monitoring subtle variations in power consumption, electromagnetic emissions, or acoustic output during cryptographic operations. By analyzing these physical patterns, adversaries can infer secret keys or internal states without directly breaching software defenses. To prevent such exposures, developers must implement robust countermeasures like randomizing processing times, masking intermediate values, and shielding hardware components to minimize signal leakage. Additionally, employing constant-time algorithms and physical tamper-evident packaging helps obscure the relationship between observable phenomena and sensitive data. This holistic approach ensures that even if an attacker gains physical proximity, the inherent noise and randomness in the system prevent successful data extraction, thereby maintaining confidentiality against sophisticated physical analysis techniques.

MITRE CWE Description
The device does not contain sufficient protection mechanisms to prevent physical side channels from exposing sensitive information due to patterns in physically observable phenomena such as variations in power consumption, electromagnetic emissions (EME), or acoustic emissions. An adversary could monitor and measure physical phenomena to detect patterns and make inferences, even if it is not possible to extract the information in the digital domain. Physical side channels have been well-studied for decades in the context of breaking implementations of cryptographic algorithms or other attacks against security features. These side channels may be easily observed by an adversary with physical access to the device, or using a tool that is in close proximity. If the adversary can monitor hardware operation and correlate its data processing with power, EME, and acoustic measurements, the adversary might be able to recover of secret keys and data.
Common Consequences (1)
ConfidentialityRead Memory, Read Application Data
Mitigations (2)
Architecture and DesignApply blinding or masking techniques to implementations of cryptographic algorithms.
ImplementationAdd shielding or tamper-resistant protections to the device to increase the difficulty of obtaining measurements of the side-channel.
Examples (2)
Consider a device that checks a passcode to unlock the screen.
As each character of
		    the PIN number is entered, a correct character
		    exhibits one current pulse shape while an
		    incorrect character exhibits a different current
		    pulse shape.
Bad · Other
Rather than comparing
		    each character to the correct PIN value as it is
		    entered, the device could accumulate the PIN in a
		    register, and do the comparison all at once at the
		    end. Alternatively, the components for the
		    comparison could be modified so that the current
		    pulse shape is the same regardless of the
		    correctness of the entered
		    character.
Good · Other
Consider the device vulnerability CVE-2021-3011, which affects certain microcontrollers [REF-1221]. The Google Titan Security Key is used for two-factor authentication using cryptographic algorithms. The device uses an internal secret key for this purpose and exchanges information based on this key for the authentication. If this internal secret key and the encryption algorithm were known to an ad…
The local method of extracting the secret key consists of plugging the key into a USB port and using electromagnetic (EM) sniffing tools and computers.
Bad · Other
Several solutions could have been considered by the manufacturer. For example, the manufacturer could shield the circuitry in the key or add randomized delays, indirect calculations with random values involved, or randomly ordered calculations to make extraction much more difficult. The manufacturer could use a combination of these techniques.
Good · Other
CVE IDTitleCVSSSeverityPublished
CVE-2026-8017 Chrome 148.0.7778.96 前 Media跨源数据泄露漏洞 — Chrome--2026-05-06
CVE-2026-5876 Google Chrome 安全漏洞 — Chrome 6.5AIMediumAI2026-04-08
CVE-2026-3929 Google Chrome 安全漏洞 — Chrome 6.5AIMediumAI2026-03-11
CVE-2025-13992 Google Chrome 安全漏洞 — Chrome 6.5AIMediumAI2025-12-03
CVE-2025-11210 Google Chrome 安全漏洞 — Chrome 4.3AIMediumAI2025-11-06
CVE-2025-11207 Google Chrome 安全漏洞 — Chrome 8.1AIHighAI2025-11-06
CVE-2025-10890 Google Chrome 安全漏洞 — Chrome 6.5AIMediumAI2025-09-24
CVE-2023-6258 Pkcs11-provider: side-channel proofing pkcs#1 1.5 paths — pkcs11-provider 8.1 High2024-01-30

Vulnerabilities classified as CWE-1300 represent 8 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.