Read Time:20 Second
Description
The device includes chicken bits or undocumented features that can create entry points for unauthorized actors.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality, Integrity, Availability, Access Control: Modify Memory, Read Memory, Execute Unauthorized Code or Commands, Gain Privileges or Assume Identity, Bypass Protection Mechanism
Potential Mitigations
Phase: Architecture and Design, Implementation
Effectiveness: High
Description: