Read Time:30 Second
Description
The product defines a large address region protected from modification by the same register lock control bit. This results in a conflict between the functional requirement that some addresses need to be writable by software during operation and the security requirement that the system configuration lock bit must be set during the boot process.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Access Control: Other
System security configuration cannot be defined in a way that does not conflict with functional requirements of device.
Potential Mitigations
Phase: Architecture and Design
Description: