Read Time:14 Second
Description
Access to security-sensitive information stored in fuses is not limited during debug.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Confidentiality, Access Control: Modify Memory, Bypass Protection Mechanism
Potential Mitigations
Phase: Architecture and Design, Implementation
Description: