CWE-1189: Improper Isolation of Shared Resources on System-on-a-Chip (SoC)

low-risk

The System-On-a-Chip (SoC) does not properly isolate shared resources between trusted and untrusted agents.

Abstraction: Base

Common Consequences

Access Control Bypass Protection Mechanism
Integrity Quality Degradation

Detection Methods

Automated Dynamic Analysis

Pre-silicon / post-silicon: Test access to shared systems resources (memory ranges, control registers, etc.) from untrusted software to verify that the assets are not incorrectly exposed to untrusted agents. Note that access to shared resources can be dynamically allowed or revoked based on system flows. Security testing should cover such dynamic shared resource allocation and access control modification flows.

Real-World Examples (3)

CVE CVSS EPSS KEV
CVE-2023-49141 7.8 0.1%
CVE-2023-42667 7.8 0.0%
CVE-2023-31325 7.2 0.0%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal