CWE-1262: Improper Access Control for Register Interface
low-riskThe product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers.
Common Consequences
Detection Methods
This is applicable in the Architecture phase before implementation started. Make sure access policy is specified for the entire memory map. Manual analysis may not ensure the implementation is correct.
Registers controlling hardware should have access control implemented. This access control may be checked manually for correct implementation. Items to check consist of how are trusted parties set, how are trusted parties verified, how are accesses verified, etc. Effectiveness of a manual analysis will vary depending upon how complicated the interface is constructed.
Functional simulation is applicable during the Implementation Phase. Testcases must be created and executed for memory mapped registers to verify adherence to the access control policy. This method can be effective, since functional verification needs to be performed on the design, and verification for this weakness will be included. There can be difficulty covering the entire memory space during the test.
Formal verification is applicable during the Implementation phase. Assertions need to be created in order to capture illegal register access scenarios and prove that they cannot occur. Formal methods are exhaustive and can be very effective, but creating the cases for large designs may be complex and difficult.
Information flow tracking can be applicable during the Implementation phase. Security sensitive data (assets) - for example, as stored in registers - is automatically tracked over time through the design to verify the data doesn't reach illegal destinations that violate the access policies for the memory map. This method can be very effective when used together with simulation and emulation, since detecting violations doesn't rely on specific scenarios or data values. This method does rely on simulation and emulation, so testcases must exist in order to use this method.
Manual documentation review of the system memory map, register specification, and permissions associated with accessing security-relevant functionality exposed via memory-mapped registers.
Perform penetration testing (either manual or semi-automated with fuzzing) to verify that access control mechanisms such as the memory protection units or on-chip bus firewall settings adequately protect critical hardware registers from software access.
Real-World Examples (9)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2022-23005 | 8.7 | 0.3% | — |
| CVE-2025-1882 | 5.0 | 0.1% | — |
| CVE-2024-6354 | 7.2 | 0.1% | — |
| CVE-2023-20599 | 7.9 | 0.1% | — |
| CVE-2024-45556 | 6.5 | 0.1% | — |
| CVE-2024-57492 | 5.5 | 0.0% | — |
| CVE-2025-47385 | 7.8 | 0.0% | — |
| CVE-2025-20788 | 4.4 | 0.0% | — |
| CVE-2025-36194 | 2.8 | 0.0% | — |