Description
Security-critical logic is not set to a known value on reset.
When the device is first brought out of reset, the state of registers will be indeterminate if they have not been initialized by the logic. Before the registers are initialized, there will be a window during which the device is in an insecure state and may be vulnerable to attack.
Potential Impact
Access Control, Authentication, Authorization
Varies by Context
Demonstrative Examples
always @(posedge clk) begin
if (en) lock_jtag <= d;
endalways @(posedge clk) begin
if (~reset) lock_jtag <= 0;
else if (en) lock_jtag <= d;
endMitigations & Prevention
Design checks should be performed to identify any uninitialized flip-flops used for security-critical functions.
All registers holding security-critical information should be set to a specific value on reset.
Related Weaknesses
Frequently Asked Questions
What is CWE-1271?
CWE-1271 (Uninitialized Value on Reset for Registers Holding Security Settings) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. Security-critical logic is not set to a known value on reset.
How can CWE-1271 be exploited?
Attackers can exploit CWE-1271 (Uninitialized Value on Reset for Registers Holding Security Settings) to varies by context. This weakness is typically introduced during the Implementation phase of software development.
How do I prevent CWE-1271?
Key mitigations include: Design checks should be performed to identify any uninitialized flip-flops used for security-critical functions.
What is the severity of CWE-1271?
CWE-1271 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.