CWE-1220: Insufficient Granularity of Access Control
Description
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
Submission Date :
Feb. 5, 2020, midnight
Modification Date :
2023-10-26 00:00:00+00:00
Organization :
Intel Corporation
Extended Description
Integrated circuits and hardware engines can expose accesses to assets (device configuration, keys, etc.) to trusted firmware or a software module (commonly set by BIOS/bootloader). This access is typically access-controlled. Upon a power reset, the hardware or system usually starts with default values in registers, and the trusted firmware (Boot firmware) configures the necessary access-control protection.
A common weakness that can exist in such protection schemes is that access controls or policies are not granular enough. This condition allows agents beyond trusted agents to access assets and could lead to a loss of functionality or the ability to set up the device securely. This further results in security risks from leaked, sensitive, key material to modification of device configuration.
Example - 1
<xhtml_table><xhtml_tr><xhtml_th>Register</xhtml_th><xhtml_th>Field description</xhtml_th></xhtml_tr><xhtml_tr><xhtml_td>AES_ENC_DEC_KEY_0</xhtml_td><xhtml_td>
AES key [0:31] for encryption or decryptionDefault 0x00000000</xhtml_td></xhtml_tr><xhtml_tr><xhtml_td>AES_ENC_DEC_KEY_1</xhtml_td><xhtml_td>
AES key [32:63] for encryption or decryptionDefault 0x00000000</xhtml_td></xhtml_tr><xhtml_tr><xhtml_td>AES_ENC_DEC_KEY_2</xhtml_td><xhtml_td>
AES key [64:95] for encryption or decryptionDefault 0x00000000</xhtml_td></xhtml_tr><xhtml_tr><xhtml_td>AES_ENC_DEC_KEY_4</xhtml_td><xhtml_td>
AES key [96:127] for encryption or decryptionDefault 0x00000000</xhtml_td></xhtml_tr><xhtml_tr><xhtml_td>AES_KEY_READ_WRITE_POLICY</xhtml_td><xhtml_td>[31:0] Default 0x00000006 - meaning agent with identities "1" and "2" can both read from and write to key registers</xhtml_td></xhtml_tr></xhtml_table>
In the above example, there is only one policy register that controls access to both read and write accesses to the AES-key registers, and thus the design is not granular enough to separate read and writes access for different agents. Here, agent with identities "1" and "2" can both read and write.
A good design should be granular enough to provide separate access controls to separate actions. Access control for reads should be separate from writes. Below is an example of such implementation where two policy registers are defined for each of these actions. The policy is defined such that: the AES-key registers can only be read or used by a crypto agent with identity "1" when bit #1 is set. The AES-key registers can only be programmed by a trusted firmware with identity "2" when bit #2 is set.
<xhtml_table><xhtml_tr><xhtml_td>AES_KEY_READ_POLICY</xhtml_td><xhtml_td>[31:0] Default 0x00000002 - meaning only Crypto engine with identity "1" can read registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3</xhtml_td></xhtml_tr><xhtml_tr><xhtml_td>AES_KEY_WRITE_POLICY</xhtml_td><xhtml_td>[31:0] Default 0x00000004 - meaning only trusted firmware with identity "2" can program registers: AES_ENC_DEC_KEY_0, AES_ENC_DEC_KEY_1, AES_ENC_DEC_KEY_2, AES_ENC_DEC_KEY_3</xhtml_td></xhtml_tr></xhtml_table>
Example - 2
The AXI ensures that only users with appropriate privileges can access specific peripherals. For instance, a ROM module is accessible exclusively with Machine privilege, and AXI enforces that users attempting to read data from the ROM must possess machine privilege; otherwise, access to the ROM is denied. The access control information and configurations are stored in a ROM.
<xhtml_b>assign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i] || ((j==6) && access_ctrl_i[i][7][priv_lvl_i]);</xhtml_b>for (j=0; j<NB_MANAGER; j++)beginendfor (i=0; i<NB_SUBORDINATE; i++)beginend......
However, in the example code above, while assigning distinct privileges to AXI manager and subordinates, both the Platform-Level Interrupt Controller Specification (PLIC) and the Core-local Interrupt Controller (CLINT) (which are peripheral numbers 6 and 7 respectively) utilize the same access control configuration. This common configuration diminishes the granularity of the AXI access control mechanism.
In certain situations, it might be necessary to grant higher privileges for accessing the PLIC than those required for accessing the CLINT. Unfortunately, this differentiation is overlooked, allowing an attacker to access the PLIC with lower privileges than intended.
As a consequence, unprivileged code can read and write to the PLIC even when it was not intended to do so. In the worst-case scenario, the attacker could manipulate interrupt priorities, potentially modifying the system's behavior or availability.
To address the aforementioned vulnerability, developers must enhance the AXI access control granularity by implementing distinct access control entries for the Platform-Level Interrupt Controller (PLIC) and the Core-local Interrupt Controller (CLINT). By doing so, different privilege levels can be defined for accessing PLIC and CLINT, effectively thwarting the potential attacks previously highlighted. This approach ensures a more robust and secure system, safeguarding against unauthorized access and manipulation of interrupt priorities. [REF-1347]
<xhtml_b>assign connectivity_map_o[i][j] = access_ctrl_i[i][j][priv_lvl_i];</xhtml_b>for (j=0; j<NB_MANAGER; j++)beginendfor (i=0; i<NB_SUBORDINATE; i++)beginend......
Example - 3
Consider the following SoCdesign. The sram in HRoT has an address range that is readable and writable by unprivilegedsoftware and it has an area that is only readable by unprivileged software. The tbusinterconnect enforces access control for subordinates on the bus but uses only one bit to controlboth read and write access. Address 0xA0000000 - 0xA000FFFF is readable and writableby the untrusted cores core{0-N} and address 0xA0010000 - 0xA001FFFF is onlyreadable by the untrusted cores core{0-N}.
Related Weaknesses
This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined to give an overview of the different insight to similar items that may exist at higher and lower levels of abstraction.
Visit http://cwe.mitre.org/ for more details.