Description
Confidential information stored in memory circuits is readable or recoverable after being cleared or erased.
Data remanence occurs when stored, memory content is not fully lost after a memory-clear or -erase operation. Confidential memory contents can still be readable through data remanence in the hardware. Data remanence can occur because of performance optimization or memory organization during 'clear' or 'erase' operations, like a design that allows the memory-organization metadata (e.g., file pointers) to be erased without erasing the actual memory content. To protect against this weakness, memory devices will often support different commands for optimized memory erase and explicit secure erase. Data remanence can also happen because of the physical properties of memory circuits in use. For example, static, random-access-memory (SRAM) and dynamic, random-access-memory (DRAM) data retention is based on the charge retained in the memory cell, which depends on factors such as power supply, refresh rates, and temperature. Other than explicit erase commands, self-encrypting, secure-memory devices can also support secure erase through cryptographic erase commands. In such designs, only the decryption keys for encrypted data stored on the device are erased. That is, the stored data are always remnant in the media after a cryptographic erase. However, only the encrypted data can be extracted. Thus, protection against data recovery in such designs relies on the strength of the encryption algorithm.
Potential Impact
Confidentiality
Modify Memory, Read Memory
Demonstrative Examples
Mitigations & Prevention
Detection Methods
- Architecture or Design Review —
- Dynamic Analysis with Manual Results Interpretation —
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2019-8575 | Firmware Data Deletion Vulnerability in which a base station factory reset might not delete all user information. The impact of this enables a new owner of a used device that has been "factory-default |
Related Weaknesses
Frequently Asked Questions
What is CWE-1330?
CWE-1330 (Remanent Data Readable after Memory Erase) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Variant-level weakness. Confidential information stored in memory circuits is readable or recoverable after being cleared or erased.
How can CWE-1330 be exploited?
Attackers can exploit CWE-1330 (Remanent Data Readable after Memory Erase) to modify memory, read memory. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-1330?
Key mitigations include:
What is the severity of CWE-1330?
CWE-1330 is classified as a Variant-level weakness (Low-Medium abstraction). It has been observed in 1 real-world CVEs.