CWE-1262
Improper Access Control for Register Interface
The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers.
Mitigation
Phase: Architecture and Design
Description:
- Design proper policies for hardware register access from software.
Mitigation
Phase: Implementation
Description:
- Ensure that access control policies for register access are implemented in accordance with the specified design.
CAPEC-680: Exploitation of Improperly Controlled Registers
An adversary exploits missing or incorrectly configured access control within registers to read/write data that is not meant to be obtained or modified by a user.