Description
The product implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens generated in the system are incorrect.
Systems-On-a-Chip (SoC) (Integrated circuits and hardware engines) implement Security Tokens to differentiate and identify actions originated from various agents. These actions could be "read", "write", "program", "reset", "fetch", "compute", etc. Security Tokens are generated and assigned to every agent on the SoC that is either capable of generating an action or receiving an action from another agent. Every agent could be assigned a unique, Security Token based on its trust level or privileges.
Potential Impact
Confidentiality, Integrity, Availability, Access Control
Modify Files or Directories, Execute Unauthorized Code or Commands, Bypass Protection Mechanism, Gain Privileges or Assume Identity, Read Memory, Modify Memory, DoS: Crash, Exit, or Restart
Demonstrative Examples
The SoC incorrectly generates Security Token "1" for every agent. In other words, both Main-controller and Aux-controller are assigned Security Token "1".The SoC should correctly generate Security Tokens, assigning "1" to the Main-controller and "2" to the Aux-controllerMitigations & Prevention
Related Weaknesses
Frequently Asked Questions
What is CWE-1270?
CWE-1270 (Generation of Incorrect Security Tokens) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens generated in the sy...
How can CWE-1270 be exploited?
Attackers can exploit CWE-1270 (Generation of Incorrect Security Tokens) to modify files or directories, execute unauthorized code or commands, bypass protection mechanism, gain privileges or assume identity, read memory, modify memory, dos: crash, exit, or restart. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-1270?
Key mitigations include:
What is the severity of CWE-1270?
CWE-1270 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.