Base · Medium

CWE-1233: Security-Sensitive Hardware Controls with Missing Lock Bit Protection

The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware sys...

CWE-1233 · Base Level ·2 CVEs ·1 Mitigations

Description

The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware system configuration.

Integrated circuits and hardware intellectual properties (IPs) might provide device configuration controls that need to be programmed after device power reset by a trusted firmware or software module, commonly set by BIOS/bootloader. After reset, there can be an expectation that the controls cannot be used to perform any further modification. This behavior is commonly implemented using a trusted lock bit, which can be set to disable writes to a protected set of registers or address regions. The lock protection is intended to prevent modification of certain system configuration (e.g., memory/memory protection unit configuration). However, if the lock bit does not effectively write-protect all system registers or controls that could modify the protected system configuration, then an adversary may be able to use software to access the registers/controls and modify the protected hardware configuration.

Potential Impact

Access Control

Modify Memory

Demonstrative Examples

Consider the example design below for a digital thermal sensor that detects overheating of the silicon and triggers system shutdown. The system critical temperature limit (CRITICAL_TEMP_LIMIT) and thermal sensor calibration (TEMP_SENSOR_CALIB) data have to be programmed by the firmware.
Bad
Register
				        Field description
				    
				
				  CRITICAL_TEMP_LIMIT
				  
				  [31:8] Reserved field; Read only; Default 0[7:0] Critical temp 0-255 Centigrade; Read-write-lock; Default 125
				  
				  
				  
				  TEMP_SENSOR_CALIB
				  
				  [31:0] Thermal sensor calibration data. A slope value used to map sensor reading to a degree Centigrade. Read-write; Default 25
				  
				  
				  
				  TEMP_SENSOR_LOCK
				  
				  [31:1] Reserved field; Read only; Default 0[0] Lock bit, locks CRITICAL_TEMP_LIMIT register; Write-1-once; Default 0
				  
				  
				  
				  TEMP_HW_SHUTDOWN
				  
				  [31:2] Reserved field; Read only; Default 0[1] Enable hardware shutdown on a critical temperature detection; Read-write; Default 0
				  
				  
				  
				  CURRENT_TEMP
				  
				  [31:8] Reserved field; Read only; Default 0[7:0]   Current Temp 0-255 Centigrade; Read-only; Default 0
Good
Change TEMP_HW_SHUTDOWN and TEMP_SENSOR_CALIB controls to be locked by TEMP_SENSOR_LOCK.
			   
			   
				
				  TEMP_SENSOR_CALIB
				  
				  [31:0] Thermal sensor calibration data. A slope value used to map sensor reading to a degree Centigrade. Read-write-Lock; Default 25; Locked by TEMP_SENSOR_LOCK bit[0]
				  
				  
				  
				  TEMP_HW_SHUTDOWN
				  
				  [31:2] Reserved field; Read only; Default 0[1] Enable hardware shutdown on critical temperature detection; Read-write-Lock; Default 0; Locked by TEMP_SENSOR_LOCK bit[0]

Mitigations & Prevention

Architecture and DesignImplementationTesting

Detection Methods

  • Manual Analysis High — Set the lock bit. Attempt to modify the information protected by the lock bit. If the information is changed, implement a design fix. Retest. Also, attempt to indirectly clear the lock bit or bypass it.

Real-World CVE Examples

CVE IDDescription
CVE-2018-9085Certain servers leave a write protection lock bit unset after boot, potentially allowing modification of parts of flash memory.
CVE-2014-8273Chain: chipset has a race condition (CWE-362) between when an interrupt handler detects an attempt to write-enable the BIOS (in violation of the lock bit), and when the handler resets the write-enable

Frequently Asked Questions

What is CWE-1233?

CWE-1233 (Security-Sensitive Hardware Controls with Missing Lock Bit Protection) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modification of system registers or controls that perform changes to important hardware sys...

How can CWE-1233 be exploited?

Attackers can exploit CWE-1233 (Security-Sensitive Hardware Controls with Missing Lock Bit Protection) to modify memory. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.

How do I prevent CWE-1233?

Key mitigations include:

What is the severity of CWE-1233?

CWE-1233 is classified as a Base-level weakness (Medium abstraction). It has been observed in 2 real-world CVEs.