2 vulnerabilities classified as CWE-1323. AI Chinese analysis included.
CWE-1323 represents a critical weakness where sensitive trace data from System-on-Chip (SoC) components is stored in unprotected locations or transmitted to untrusted agents. This vulnerability arises because trace data, collected to verify complex SoC designs, often contains proprietary architectural details or operational secrets. Attackers typically exploit this by intercepting the data during transport or accessing the insecure storage, thereby gaining unauthorized insight into the system’s internal logic and potential security flaws. To mitigate this risk, developers must implement robust encryption for data in transit and enforce strict access controls for data at rest. Additionally, integrating hardware-based security features that isolate trace data from general-purpose memory and ensuring that only authorized, trusted agents can access these streams are essential practices for preventing information leakage and maintaining the integrity of the SoC design.
The traces do
not have any privilege level attached to them. All
collected traces can be viewed by any debugger (i.e., SoC
designer, OEM debugger, or end user).Some of the
traces are SoC-design-house secrets, while some are OEM
secrets. Few are end-user secrets and the rest are
not security-sensitive. Tag all traces with the
appropriate, privilege level at the source. The bits
indicating the privilege level must be immutable in
their transit from trace source to the final, trace
sink. Debugger privilege level must be checked before
providing access to traces.| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-54173 | IBM MQ information disclosure — MQ | 4.7 | Medium | 2025-02-28 |
| CVE-2024-49338 | IBM App Connect Enterprise information disclosure — App Connect Enterprise | 4.4 | Medium | 2025-01-18 |
Vulnerabilities classified as CWE-1323 represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.