Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MITRE Updates List of Most Common Hardware Weaknesses

Posted on August 22, 2025August 22, 2025 By CWS

The non-profit MITRE Company this week revealed a revised CWE Most Necessary {Hardware} Weaknesses (MIHW) to align it with the evolution of the {hardware} safety panorama.

Initially launched in 2021, the CWE MIHW checklist consists of frequent errors that result in vital {hardware} vulnerabilities, and is supposed to lift consciousness throughout the group, to assist eradicate {hardware} flaws from the beginning.

The up to date checklist consists of 11 entries and comes with new lessons, classes, and base weaknesses, however retains 5 of the entries that have been included within the 2021 CWE MIHW checklist. It reveals a give attention to useful resource reuse, debug mode bugs, and fault injection.

‘CWE-226: Delicate Info in Useful resource Not Eliminated Earlier than Reuse’ is on the high of MITRE’s 2025 CWE MIHW checklist.

It refers to assets which can be launched and could also be made out there for reuse with out being correctly cleared. If reminiscence, for instance, is just not cleared earlier than it’s made out there to a distinct course of, information may turn into out there to much less reliable events.

“This weak spot can apply in {hardware}, equivalent to when a tool or system switches between energy, sleep, or debug states throughout regular operation, or when execution adjustments to completely different customers or privilege ranges,” CWE-226’s description reads.

Second on the revised checklist is ‘CWE-1189: Improper Isolation of Shared Assets on System-on-a-Chip (SoC)’, which was on the high 4 years in the past.

Different entries that have been saved from the earlier model of the checklist embody ‘CWE-1191: On-Chip Debug and Take a look at Interface With Improper Entry Management’, ‘CWE-1256: Improper Restriction of Software program Interfaces to {Hardware} Options’, ‘CWE-1260: Improper Dealing with of Overlap Between Protected Reminiscence Ranges’, and ‘CWE-1300: Improper Safety of Bodily Facet Channels’.Commercial. Scroll to proceed studying.

“These entries signify persistent challenges in {hardware} safety which can be each theoretically vital and generally noticed in follow. Their continued inclusion, even with the shift to a hybrid skilled and data-driven choice course of, underscores their ongoing significance,” MITRE notes.

Of the six new CWEs that made it to the revised MIHW checklist, two have been added to the CWE after the 2021 MIHW checklist was launched.

Along with the 11 weaknesses included in the primary MIHW checklist, MITRE warns of 5 others which can be additionally extremely vital and will result in critical safety defects. These embody 4 entries that have been within the earlier iteration of the checklist.

“{Hardware} weaknesses propagate upward: as soon as embedded in silicon, they constrain software program, firmware, and system-level mitigations. Engineers working at larger layers want to know that some dangers are inherited and will by no means be absolutely remediated at their degree. That makes transparency from distributors, unbiased analysis ecosystems, and higher incentives for proactive safety in design vital,” NCC Group managing safety guide Liz James stated.

Associated: MITRE Unveils AADAPT Framework to Sort out Cryptocurrency Threats

Associated: MITRE Publishes Submit-Quantum Cryptography Migration Roadmap

Associated: MITRE CVE Program Will get Final-Hour Funding Reprieve

Associated: MITRE Updates Listing of 25 Most Harmful Software program Vulnerabilities

Security Week News Tags:Common, Hardware, List, MITRE, Updates, Weaknesses

Post navigation

Previous Post: AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
Next Post: Hundreds Targeted in New Atomic macOS Stealer Campaign

Related Posts

Zip Security Raises $13.5 Million in Series A Funding Security Week News
Cyberattack On Russian Airline Aeroflot Causes the Cancellation of More Than 100 Flights Security Week News
Microsoft to Lay Off About 3% of Its Workforce Security Week News
Critical Authentication Bypass Flaw Patched in Teleport Security Week News
CISA Warns AMI BMC Vulnerability Exploited in the Wild Security Week News
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks
  • Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
  • New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection
  • How to Track Changes in Data Breach Dumps
  • Hundreds of Thousands of Users Grok Chats Exposed in Google Search Results

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks
  • Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
  • New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection
  • How to Track Changes in Data Breach Dumps
  • Hundreds of Thousands of Users Grok Chats Exposed in Google Search Results

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News