Class · High

CWE-1263: Improper Physical Access Control

The product is designed with access restricted to certain information, but it does not sufficiently protect against an unauthorized actor with physical access to these areas.

CWE-1263 · Class Level ·3 Mitigations

Description

The product is designed with access restricted to certain information, but it does not sufficiently protect against an unauthorized actor with physical access to these areas.

Sections of a product intended to have restricted access may be inadvertently or intentionally rendered accessible when the implemented physical protections are insufficient. The specific requirements around how robust the design of the physical protection mechanism needs to be depends on the type of product being protected. Selecting the correct physical protection mechanism and properly enforcing it through implementation and manufacturing are critical to the overall physical security of the product.

Potential Impact

Confidentiality, Integrity, Access Control

Varies by Context

Mitigations & Prevention

Architecture and Design

Specific protection requirements depend strongly on contextual factors including the level of acceptable risk associated with compromise to the product's protection mechanism. Designers could incorporate anti-tampering measures that protect against or detect when the product has been tampered with.

Testing

The testing phase of the lifecycle should establish a method for determining whether the protection mechanism is sufficient to prevent unauthorized access.

Manufacturing

Ensure that all protection mechanisms are fully activated at the time of manufacturing and distribution.

Frequently Asked Questions

What is CWE-1263?

CWE-1263 (Improper Physical Access Control) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Class-level weakness. The product is designed with access restricted to certain information, but it does not sufficiently protect against an unauthorized actor with physical access to these areas.

How can CWE-1263 be exploited?

Attackers can exploit CWE-1263 (Improper Physical Access Control) to varies by context. This weakness is typically introduced during the Architecture and Design, Manufacturing phase of software development.

How do I prevent CWE-1263?

Key mitigations include: Specific protection requirements depend strongly on contextual factors including the level of acceptable risk associated with compromise to the product's protection mechanism. Designers could incorpor

What is the severity of CWE-1263?

CWE-1263 is classified as a Class-level weakness (High abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.