Read Time:19 Second
Description
The CPU is not configured to provide hardware support for exclusivity of write and execute operations on memory. This allows an attacker to execute data from all of memory.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality, Integrity: Execute Unauthorized Code or Commands
Potential Mitigations
Phase: Architecture and Design
Description:
Phase: Integration
Description: