Description
The security-sensitive hardware module contains semiconductor defects.
A semiconductor device can fail for various reasons. While some are manufacturing and packaging defects, the rest are due to prolonged use or usage under extreme conditions. Some mechanisms that lead to semiconductor defects include encapsulation failure, die-attach failure, wire-bond failure, bulk-silicon defects, oxide-layer faults, aluminum-metal faults (including electromigration, corrosion of aluminum, etc.), and thermal/electrical stress. These defects manifest as faults on chip-internal signals or registers, have the effect of inputs, outputs, or intermediate signals being always 0 or always 1, and do not switch as expected.
Potential Impact
Availability, Access Control
DoS: Instability
Demonstrative Examples
A manufacturing defect in this logic manifests itself as a logical fault, which always sets the output of the filter to "allow" access.Mitigations & Prevention
While semiconductor-manufacturing companies implement several mechanisms to continuously improve the semiconductor manufacturing process to ensure reduction of defects, some defects can only be fixed after manufacturing. Post-manufacturing testing of silicon die is critical. Fault models such as stuck-at-0 or stuck-at-1 must be used to develop post-manufacturing test cases and achieve good coverage. Once the silicon packaging is done, extensive post-silicon testing must be performed to ensure th
Operating the hardware outside device specification, such as at extremely high temperatures, voltage, etc., accelerates semiconductor degradation and results in defects. When these defects manifest as faults in security-critical, hardware modules, it results in compromise of security guarantees. Thus, operating the device within the specification is important.
Related Weaknesses
Frequently Asked Questions
What is CWE-1248?
CWE-1248 (Semiconductor Defects in Hardware Logic with Security-Sensitive Implications) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The security-sensitive hardware module contains semiconductor defects.
How can CWE-1248 be exploited?
Attackers can exploit CWE-1248 (Semiconductor Defects in Hardware Logic with Security-Sensitive Implications) to dos: instability. This weakness is typically introduced during the Manufacturing, Operation phase of software development.
How do I prevent CWE-1248?
Key mitigations include: While semiconductor-manufacturing companies implement several mechanisms to continuously improve the semiconductor manufacturing process to ensure reduction of defects, some defects can only be fixed
What is the severity of CWE-1248?
CWE-1248 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.