Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1334 — Vulnerability Class 1

1 vulnerabilities classified as CWE-1334. AI Chinese analysis included.

CWE-1334 represents a critical hardware design weakness where unauthorized agents manipulate redundant components to degrade system reliability. This vulnerability typically arises when hardware redundancy mechanisms lack proper access controls or integrity checks, allowing malicious actors to inject errors into backup blocks. By corrupting these redundant units, attackers effectively disable failover capabilities, forcing the system into a degraded operating mode or causing total failure when primary components malfunction. This exploitation undermines the fundamental purpose of hardware redundancy, which is to ensure continuous operation during faults. To mitigate this risk, developers must implement strict authentication and authorization protocols for hardware configuration registers. Additionally, employing cryptographic integrity verification for redundant block states and utilizing hardware-enforced isolation between control logic and redundancy management circuits can prevent unauthorized injection, ensuring that backup systems remain functional and trustworthy during critical failure scenarios.

MITRE CWE Description
An unauthorized agent can inject errors into a redundant block to deprive the system of redundancy or put the system in a degraded operating mode. To ensure the performance and functional reliability of certain components, hardware designers can implement hardware blocks for redundancy in the case that others fail. This redundant block can be prevented from performing as intended if the design allows unauthorized agents to inject errors into it. In this way, a path with injected errors may become unavailable to serve as a redundant channel. This may put the system into a degraded mode of operation which could be exploited by a subsequent attack.
Common Consequences (1)
Integrity, AvailabilityDoS: Crash, Exit, or Restart, DoS: Instability, Quality Degradation, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Resource Consumption (Other), Reduce Performance, Reduce Reliability, Unexpected State
Mitigations (3)
Architecture and DesignEnsure the design does not allow error injection in modes intended for normal run-time operation. Provide access controls on interfaces for injecting errors.
ImplementationDisallow error injection in modes which are expected to be used for normal run-time operation. Provide access controls on interfaces for injecting errors.
IntegrationAdd an access control layer atop any unprotected interfaces for injecting errors.
CVE IDTitleCVSSSeverityPublished
CVE-2018-25159 Epross AVCON6 OGNL Remote Code Execution via login.action — AVCON6 systems management platform 9.8 Critical2026-03-11

Vulnerabilities classified as CWE-1334 represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.