CWE-1323 类弱点 2 条 CVE 漏洞汇总,含 AI 中文分析。
CWE-1323 属于敏感数据管理不当漏洞,主要涉及系统级芯片(SoC)中实时追踪内部信号的调试数据。攻击者可通过访问未受保护的存储位置或拦截传输过程,窃取这些包含敏感逻辑状态的追踪数据,进而推断系统架构或提取机密信息。开发者应避免将此类数据存储在明文或公共区域,并采用加密传输及严格的访问控制机制,确保仅授权实体可访问,从而防止敏感追踪信息泄露。
The traces do
not have any privilege level attached to them. All
collected traces can be viewed by any debugger (i.e., SoC
designer, OEM debugger, or end user).Some of the
traces are SoC-design-house secrets, while some are OEM
secrets. Few are end-user secrets and the rest are
not security-sensitive. Tag all traces with the
appropriate, privilege level at the source. The bits
indicating the privilege level must be immutable in
their transit from trace source to the final, trace
sink. Debugger privilege level must be checked before
providing access to traces.| CVE ID | 标题 | CVSS | 风险等级 | Published |
|---|---|---|---|---|
| CVE-2024-54173 | IBM MQ 安全漏洞 — MQ | 4.7 | Medium | 2025-02-28 |
| CVE-2024-49338 | IBM App Connect Enterprise 安全漏洞 — App Connect Enterprise | 4.4 | Medium | 2025-01-18 |
CWE-1323 是常见的弱点类别,本平台收录该类弱点关联的 2 条 CVE 漏洞。