Physical Access Issues and Concerns
A category in the Common Weakness Enumeration published by The MITRE Corporation.
Summary
Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.
Weaknesses in this category are related to concerns of physical access.
Weaknesses
A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the referenc...
The device is missing or incorrectly implements circuitry or sensors that detect and mitigate the skipping of security-critical CPU instructions when they occur.
A hardware device, or the firmware running on it, is missing or has incorrect protection features to maintain goals of security primiti...
The product does not properly handle unexpected physical or environmental conditions that occur naturally or are artificially induced.
The hardware logic does not effectively handle when single-event upsets (SEUs) occur.
The device is susceptible to electromagnetic fault injection attacks, causing device internal information to be compromised or security mechanisms to be bypassed.
The device does not contain or contains incorrectly implemented circuitry or sensors to detect and mitigate voltage and clock glitches and protect sensitive informatio...
Information stored in hardware may be recovered by an attacker with the capability to capture and analyze images of the integrated circuit using techniques such as sca...
The security-sensitive hardware module contains semiconductor defects.
Concepts
This view organizes weaknesses around concepts that are frequently used or encountered in hardware design. Accordingly, this view can align closely with the perspectiv...
Common Weakness Enumeration content on this website is copyright of The MITRE Corporation unless otherwise specified. Use of the Common Weakness Enumeration and the associated references on this website are subject to the Terms of Use as specified by The MITRE Corporation.