Share via:
Main MIHW Table
CWE ID |
Name |
CWE-226 | Sensitive Information in Resource Not Removed Before Reuse |
CWE-1189 | Improper Isolation of Shared Resources on System-on-a-Chip (SoC) |
CWE-1191 | On-Chip Debug and Test Interface With Improper Access Control |
CWE-1234 | Hardware Internal or Debug Modes Allow Override of Locks |
CWE-1247 | Improper Protection Against Voltage and Clock Glitches |
CWE-1256 | Improper Restriction of Software Interfaces to Hardware Features |
CWE-1260 | Improper Handling of Overlap Between Protected Memory Ranges |
CWE-1262 | Improper Access Control for Register Interface |
CWE-1300 | Improper Protection of Physical Side Channels |
CWE-1421 | Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution |
CWE-1423 | Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution |
Expert Insights: Weaknesses Beyond Data Trends
CWE-1231 | Improper Prevention of Lock Bit Modification |
CWE-1233 | Security-Sensitive Hardware Controls with Missing Lock Bit Protection |
CWE-1244 | Internal Asset Exposed to Unsafe Debug Access Level or State |
CWE-1272 | Sensitive Information Uncleared Before Debug/Power State Transition |
CWE-1431 | Driving Intermediate Cryptographic State/Results to Hardware Module Outputs |
More information is available — Please edit the custom filter or select a different filter.
|