| Home > CAPEC List > CAPEC-679: Exploitation of Improperly Configured or Implemented Memory Protections (Version 3.9) |
|
An adversary takes advantage of missing or incorrectly configured access control within memory to read/write data or inject malicious code into said memory.
Hardware product designs often need to implement memory protection features to prevent users from reading and modifying memory reserved for security operations such as secure booting, authenticating code, device attestation, and more. However, these protection features may be missing if not configured by developers. For example, this can occur if the developers assume these features are configured elsewhere. Additionally, developers often attempt to impose proper protection features, but may incorrectly configure these controls. One such example would be setting controls with insufficient granularity for protected address regions. If an adversary is able to discover improper access controls surrounding memory, it could result in the adversary obtaining sensitive data, executing code, circumventing security mechanisms, escalating privileges, or even denying service to higher privilege software.
Medium
Very High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 1 | Accessing Functionality Not Properly Constrained by ACLs |
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 180 | Exploiting Incorrectly Configured Access Control Security Levels |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Hardware |
| Mechanisms of Attack | Subvert Access Control |
| Scope | Impact | Likelihood |
|---|---|---|
Integrity | Modify Data | |
Confidentiality | Read Data | |
Confidentiality Integrity Availability | Execute Unauthorized Commands | |
Confidentiality Access Control Authorization | Gain Privileges |
A hardware product contains non-volatile memory, which itself contains boot code that is insufficiently protected. An adversary then modifies this memory to either bypass the secure boot process or to execute their own code.
A hardware product leverages a CPU that does not possess a memory-protection unit (MPU) and a memory-management unit (MMU) nor a special bit to support write exclusivity, resulting in no write exclusivity. Because of this, an adversary is able to inject malicious code into the memory and later execute it to achieve the desired outcome.
| CWE-ID | Weakness Name |
|---|---|
| 1222 | Insufficient Granularity of Address Regions Protected by Register Locks |
| 1252 | CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
| 1257 | Improper Access Control Applied to Mirrored or Aliased Memory Regions |
| 1260 | Improper Handling of Overlap Between Protected Memory Ranges |
| 1274 | Improper Access Control for Volatile Memory Containing Boot Code |
| 1282 | Assumed-Immutable Data is Stored in Writable Memory |
| 1312 | Missing Protection for Mirrored Regions in On-Chip Fabric Firewall |
| 1316 | Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
| 1326 | Missing Immutable Root of Trust in Hardware |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2021年10月21日 (Version 3.6) | CAPEC Content Team | The MITRE Corporation |
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||