The Most Dangerous Hardware Weaknesses, MITRE

November 3, 2021

The non-profit organization MITRE has published a list of the most dangerous vulnerabilities in programming, design, and architecture that will affect hardware in 2021. These weaknesses are found in hardware programming and design leading to exploitable vulnerabilities and exposing systems to cyberattacks.

This list is the result of the joint work of the organization within the Hardware CWE Special Interest Group (SIG), a group of professionals from hardware design, manufacturing, research, security, academia and government.

The following list gives an insight into the ten most dangerous hardware security vulnerabilities out of 96 hardware entries in the CWE corpus.

CWE-1189Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
CWE-1191On-Chip Debug and Test Interface With Improper Access Control
CWE-1231Improper Prevention of Lock Bit Modification
CWE-1233Security-Sensitive Hardware Controls with Missing Lock Bit Protection
CWE-1240Use of a Cryptographic Primitive with a Risky Implementation
CWE-1244Internal Asset Exposed to Unsafe Debug Access Level or State
CWE-1256Improper Restriction of Software Interfaces to Hardware Features
CWE-1260Improper Handling of Overlap Between Protected Memory Ranges
CWE-1272Sensitive Information Uncleared Before Debug/Power State Transition
CWE-1274Improper Access Control for Volatile Memory Containing Boot Code
CWE-1277Firmware Not Updateable
CWE-1300Improper Protection of Physical Side Channels

The list also aims to prevent hardware security problems at the source by educating programmers and designers on how to eliminate critical bugs early in the product development lifecycle.

In addition, test engineers and safety analysts may also consider the list useful in preparing for safety tests and evaluation plans.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn