Read Time:20 Second
Description
The product enables components that contain untrusted firmware before memory and fabric access controls have been enabled.
Modes of Introduction:
Related Weaknesses
Consequences
Access Control: Bypass Protection Mechanism
An untrusted component can master transactions on the HW bus and target memory or other assets to compromise the SoC boot firmware.
Potential Mitigations
Phase: Architecture and Design
Description: