CAPEC 681 Exploitation of Improperly Controlled Hardware Security Identifiers

Draft Detailed Medium Risk
Severity Very High

Description

{'xhtml:p': 'An adversary takes advantage of missing or incorrectly configured security identifiers (e.g., tokens), which are used for access control within a System-on-Chip (SoC), to read/write data or execute a given action.'}

Mitigations

3

Consequences

Relationships