MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs

MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs

February 29, 2024 at 02:28PM

The MITRE-led CWE program added four new microprocessor-related weaknesses, including exposure of sensitive information during transient execution and data leaks tied to microarchitectural structures and incorrect data forwarding. These vulnerabilities help processors address major issues like Meltdown and Spectre and contribute to a common language for discussing microprocessor weaknesses in the semiconductor space.

The meeting notes highlight the addition of four new microprocessor-related weaknesses to the Common Weakness Enumeration (CWE) program’s list, which is widely used to describe and document weakness types. These weaknesses, introduced in version 4.14, are the result of a collaborative effort among industry leaders such as Intel, AMD, Arm, Riscure, and Cycuity. They aim to provide a common language for discussing weaknesses in modern microprocessor architectures and help identify and mitigate vulnerabilities in microprocessor technologies.

The four new CWEs (CWE-1420, CWE-1421, CWE-1422, and CWE-1423) specifically address issues related to transient or speculative execution and data exposure within microprocessors. These vulnerabilities are important due to the increasing number of side-channel exploits targeting CPU resources. Stakeholders in the hardware and microprocessor communities are focused on addressing these vulnerabilities through early detection and firmware updates, ultimately aiming to design out these vulnerabilities in future versions.

The collaboration was sparked by the need to establish a common understanding of the root causes behind major vulnerabilities like Meltdown and Spectre. This effort reflects some of the most technically challenging and complex work undertaken by the CWE program. The ultimate goal is to provide microprocessor designers with information to help them design around the causes that led to these vulnerabilities and similar ones.

Overall, the meeting notes highlight the significance of these new microprocessor-related weaknesses and the collaborative effort to address and mitigate vulnerabilities in modern microprocessor architectures.

Full Article