Description
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
Integrated circuits and hardware engines can expose accesses to assets (device configuration, keys, etc.) to trusted firmware or a software module (commonly set by BIOS/bootloader). This access is typically access-controlled. Upon a power reset, the hardware or system usually starts with default values in registers, and the trusted firmware (Boot firmware) configures the necessary access-control protection. A common weakness that can exist in such protection schemes is that access controls or policies are not granular enough. This condition allows agents beyond trusted agents to access assets and could lead to a loss of functionality or the ability to set up the device securely. This further results in security risks from leaked, sensitive, key material to modification of device configuration.
Potential Impact
Confidentiality, Integrity, Availability, Access Control
Modify Memory, Read Memory, Execute Unauthorized Code or Commands, Gain Privileges or Assume Identity, Bypass Protection Mechanism, Other
Demonstrative Examples
Register
Field description
AES_ENC_DEC_KEY_0
AES key [0:31] for encryption or decryptionDefault 0x00000000
AES_ENC_DEC_KEY_1
AES key [32:63] for encryption or decryptionDefault 0x00000000
AES_ENC_DEC_KEY_2
AES key [64:95] for encryption or decryptionDefault 0x00000000
AES_ENC_DEC_KEY_4
AES key [96:127] for encryption or decryptionDefault 0x00000000
AES_KEY_READ_WRITE_POLICY
[31:0] Default 0x00000006 - meaning agent with identities "1" and "2" can both read from and write to key registersAES_KEY_READ_POLICY
[31:0] Default 0x00000002 - meaning only Crypto engine with identity "1" can read registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3
AES_KEY_WRITE_POLICY
[31:0] Default 0x00000004 - meaning only trusted firmware with identity "2" can program registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3...
for (i=0; i<NB_SUBORDINATE; i++)
begin
for (j=0; j<NB_MANAGER; j++)
begin
assign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i] || ((j==6) && access_ctrl_i[i][7][priv_lvl_i]);
end
end
......
for (i=0; i<NB_SUBORDINATE; i++)
begin
for (j=0; j<NB_MANAGER; j++)
begin
assign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i];
end
end
...Mitigations & Prevention
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2022-24985 | A form hosting website only checks the session authentication status for a single form, making it possible to bypass authentication when there are multiple forms |
| CVE-2021-36934 | An operating system has an overly permission Access Control List onsome system files, including those related to user passwords |
Related Weaknesses
Frequently Asked Questions
What is CWE-1220?
CWE-1220 (Insufficient Granularity of Access Control) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, impl...
How can CWE-1220 be exploited?
Attackers can exploit CWE-1220 (Insufficient Granularity of Access Control) to modify memory, read memory, execute unauthorized code or commands, gain privileges or assume identity, bypass protection mechanism, other. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-1220?
Key mitigations include:
What is the severity of CWE-1220?
CWE-1220 is classified as a Base-level weakness (Medium abstraction). It has been observed in 2 real-world CVEs.