Description
The bus controller enables bits in the fabric end-point to allow responder devices to control transactions on the fabric.
To support reusability, certain fabric interfaces and end points provide a configurable register bit that allows IP blocks connected to the controller to access other peripherals connected to the fabric. This allows the end point to be used with devices that function as a controller or responder. If this bit is set by default in hardware, or if firmware incorrectly sets it later, a device intended to be a responder on a fabric is now capable of controlling transactions to other devices and might compromise system security.
Potential Impact
Access Control
Modify Memory, Read Memory, Bypass Protection Mechanism
Demonstrative Examples
Mitigations & Prevention
For responder devices, the register bit in the fabric end-point that enables the bus controlling capability must be set to 0 by default. This bit should not be set during secure-boot flows. Also, writes to this register must be access-protected to prevent malicious modifications to obtain bus-controlling capability.
For responder devices, the register bit in the fabric end-point that enables the bus controlling capability must be set to 0 by default. This bit should not be set during secure-boot flows. Also, writes to this register must be access-protected to prevent malicious modifications to obtain bus-controlling capability.
For responder devices, the register bit in the fabric end-point that enables the bus controlling capability must be set to 0 by default. This bit should not be set during secure-boot flows. Also, writes to this register must be access-protected to prevent malicious modifications to obtain bus-controlling capability.
Related Weaknesses
Frequently Asked Questions
What is CWE-1315?
CWE-1315 (Improper Setting of Bus Controlling Capability in Fabric End-point) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The bus controller enables bits in the fabric end-point to allow responder devices to control transactions on the fabric.
How can CWE-1315 be exploited?
Attackers can exploit CWE-1315 (Improper Setting of Bus Controlling Capability in Fabric End-point) to modify memory, read memory, bypass protection mechanism. This weakness is typically introduced during the Architecture and Design, Implementation, System Configuration phase of software development.
How do I prevent CWE-1315?
Key mitigations include: For responder devices, the register bit in the fabric end-point that enables the bus controlling capability must be set to 0 by default. This bit should not be set during secure-boot flows. Also, writ
What is the severity of CWE-1315?
CWE-1315 is classified as a Base-level weakness (Medium abstraction). Its actual severity depends on the specific context and how the weakness manifests in your application.