Description
The System-On-A-Chip (SoC) implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens are improperly protected.
Systems-On-A-Chip (Integrated circuits and hardware engines) implement Security Tokens to differentiate and identify which actions originated from which agent. These actions may be one of the directives: 'read', 'write', 'program', 'reset', 'fetch', 'compute', etc. Security Tokens are assigned to every agent in the System that is capable of generating an action or receiving an action from another agent. Multiple Security Tokens may be assigned to an agent and may be unique based on the agent's trust level or allowed privileges. Since the Security Tokens are integral for the maintenance of security in an SoC, they need to be protected properly. A common weakness afflicting Security Tokens is improperly restricting the assignment to trusted components.
Potential Impact
Confidentiality, Integrity, Availability, Access Control
Modify Files or Directories, Execute Unauthorized Code or Commands, Bypass Protection Mechanism, Gain Privileges or Assume Identity, Modify Memory, Modify Memory, DoS: Crash, Exit, or Restart
Demonstrative Examples
The Aux-controller could program its Security Token to "1" from "2".The SoC needs to protect the Security Tokens. None of the agents in the SoC should have the ability to change the Security Token.Mitigations & Prevention
Related Weaknesses
Frequently Asked Questions
What is CWE-1259?
CWE-1259 (Improper Restriction of Security Token Assignment) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The System-On-A-Chip (SoC) implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens are...
How can CWE-1259 be exploited?
Attackers can exploit CWE-1259 (Improper Restriction of Security Token Assignment) to modify files or directories, execute unauthorized code or commands, bypass protection mechanism, gain privileges or assume identity, modify memory, modify memory, dos: crash, exit, or restart. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-1259?
Key mitigations include:
What is the severity of CWE-1259?
CWE-1259 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.