Base · Medium

CWE-1248: Semiconductor Defects in Hardware Logic with Security-Sensitive Implications

The security-sensitive hardware module contains semiconductor defects.

CWE-1248 · Base Level ·2 Mitigations

Description

The security-sensitive hardware module contains semiconductor defects.

A semiconductor device can fail for various reasons. While some are manufacturing and packaging defects, the rest are due to prolonged use or usage under extreme conditions. Some mechanisms that lead to semiconductor defects include encapsulation failure, die-attach failure, wire-bond failure, bulk-silicon defects, oxide-layer faults, aluminum-metal faults (including electromigration, corrosion of aluminum, etc.), and thermal/electrical stress. These defects manifest as faults on chip-internal signals or registers, have the effect of inputs, outputs, or intermediate signals being always 0 or always 1, and do not switch as expected.

Potential Impact

Availability, Access Control

DoS: Instability

Demonstrative Examples

The network-on-chip implements a firewall for access control to peripherals from all IP cores capable of mastering transactions.
Bad
A manufacturing defect in this logic manifests itself as a logical fault, which always sets the output of the filter to "allow" access.
Post-manufacture testing must be performed to ensure that hardware logic implementing security functionalities is defect-free.

Mitigations & Prevention

Testing

While semiconductor-manufacturing companies implement several mechanisms to continuously improve the semiconductor manufacturing process to ensure reduction of defects, some defects can only be fixed after manufacturing. Post-manufacturing testing of silicon die is critical. Fault models such as stuck-at-0 or stuck-at-1 must be used to develop post-manufacturing test cases and achieve good coverage. Once the silicon packaging is done, extensive post-silicon testing must be performed to ensure th

Operation

Operating the hardware outside device specification, such as at extremely high temperatures, voltage, etc., accelerates semiconductor degradation and results in defects. When these defects manifest as faults in security-critical, hardware modules, it results in compromise of security guarantees. Thus, operating the device within the specification is important.

Frequently Asked Questions

What is CWE-1248?

CWE-1248 (Semiconductor Defects in Hardware Logic with Security-Sensitive Implications) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The security-sensitive hardware module contains semiconductor defects.

How can CWE-1248 be exploited?

Attackers can exploit CWE-1248 (Semiconductor Defects in Hardware Logic with Security-Sensitive Implications) to dos: instability. This weakness is typically introduced during the Manufacturing, Operation phase of software development.

How do I prevent CWE-1248?

Key mitigations include: While semiconductor-manufacturing companies implement several mechanisms to continuously improve the semiconductor manufacturing process to ensure reduction of defects, some defects can only be fixed

What is the severity of CWE-1248?

CWE-1248 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.