CAPEC 702 Exploiting Incorrect Chaining or Granularity of Hardware Debug Components

Draft Detailed Low Risk
Severity Medium

Description

{'xhtml:p': 'An adversary exploits incorrect chaining or granularity of hardware debug components in order to gain unauthorized access to debug functionality on a chip. This happens when authorization is not checked on a per function basis and is assumed for a chain or group of debug functionality.'}

Attack Execution Flow

3

Mitigations

2

Consequences

Relationships

Resources Required

2