CWE-1242

Inclusion of Undocumented Features or Chicken Bits

Weakness Description

The device includes chicken bits or undocumented features that can create entry points for unauthorized actors.

A common design practice is to use undocumented bits on a device that can be used to disable certain functional security features. These bits are commonly referred to as "chicken bits". They can facilitate quick identification and isolation of faulty components, features that negatively affect performance, or features that do not provide the required controllability for debug and test. Another way to achieve this is through implementation of undocumented features.

Potential Mitigations

Architecture and DesignImplementation

The implementation of chicken bits in a released product is highly discouraged. If implemented at all, ensure that they are disabled in production devices. All interfaces to a device should be documented.

Effectiveness: High

Common Consequences

ConfidentialityIntegrityAvailabilityAccess Control
Modify MemoryRead MemoryExecute Unauthorized Code or CommandsGain Privileges or Assume IdentityBypass Protection Mechanism

An attacker might exploit these interfaces for unauthorized access.

Advertisement

Related Weaknesses