CWE-1189: Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
low-riskThe System-On-a-Chip (SoC) does not properly isolate shared resources between trusted and untrusted agents.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Integrity
→
Quality Degradation
Detection Methods
Automated Dynamic Analysis
Pre-silicon / post-silicon: Test access to shared systems resources (memory ranges, control registers, etc.) from untrusted software to verify that the assets are not incorrectly exposed to untrusted agents. Note that access to shared resources can be dynamically allowed or revoked based on system flows. Security testing should cover such dynamic shared resource allocation and access control modification flows.
Real-World Examples (3)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2023-49141 | 7.8 | 0.1% | — |
| CVE-2023-42667 | 7.8 | 0.0% | — |
| CVE-2023-31325 | 7.2 | 0.0% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal