Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MITRE Updates List of Most Common Hardware Weaknesses

Posted on August 22, 2025August 22, 2025 By CWS

The non-profit MITRE Company this week revealed a revised CWE Most Necessary {Hardware} Weaknesses (MIHW) to align it with the evolution of the {hardware} safety panorama.

Initially launched in 2021, the CWE MIHW checklist consists of frequent errors that result in vital {hardware} vulnerabilities, and is supposed to lift consciousness throughout the group, to assist eradicate {hardware} flaws from the beginning.

The up to date checklist consists of 11 entries and comes with new lessons, classes, and base weaknesses, however retains 5 of the entries that have been included within the 2021 CWE MIHW checklist. It reveals a give attention to useful resource reuse, debug mode bugs, and fault injection.

‘CWE-226: Delicate Info in Useful resource Not Eliminated Earlier than Reuse’ is on the high of MITRE’s 2025 CWE MIHW checklist.

It refers to assets which can be launched and could also be made out there for reuse with out being correctly cleared. If reminiscence, for instance, is just not cleared earlier than it’s made out there to a distinct course of, information may turn into out there to much less reliable events.

“This weak spot can apply in {hardware}, equivalent to when a tool or system switches between energy, sleep, or debug states throughout regular operation, or when execution adjustments to completely different customers or privilege ranges,” CWE-226’s description reads.

Second on the revised checklist is ‘CWE-1189: Improper Isolation of Shared Assets on System-on-a-Chip (SoC)’, which was on the high 4 years in the past.

Different entries that have been saved from the earlier model of the checklist embody ‘CWE-1191: On-Chip Debug and Take a look at Interface With Improper Entry Management’, ‘CWE-1256: Improper Restriction of Software program Interfaces to {Hardware} Options’, ‘CWE-1260: Improper Dealing with of Overlap Between Protected Reminiscence Ranges’, and ‘CWE-1300: Improper Safety of Bodily Facet Channels’.Commercial. Scroll to proceed studying.

“These entries signify persistent challenges in {hardware} safety which can be each theoretically vital and generally noticed in follow. Their continued inclusion, even with the shift to a hybrid skilled and data-driven choice course of, underscores their ongoing significance,” MITRE notes.

Of the six new CWEs that made it to the revised MIHW checklist, two have been added to the CWE after the 2021 MIHW checklist was launched.

Along with the 11 weaknesses included in the primary MIHW checklist, MITRE warns of 5 others which can be additionally extremely vital and will result in critical safety defects. These embody 4 entries that have been within the earlier iteration of the checklist.

“{Hardware} weaknesses propagate upward: as soon as embedded in silicon, they constrain software program, firmware, and system-level mitigations. Engineers working at larger layers want to know that some dangers are inherited and will by no means be absolutely remediated at their degree. That makes transparency from distributors, unbiased analysis ecosystems, and higher incentives for proactive safety in design vital,” NCC Group managing safety guide Liz James stated.

Associated: MITRE Unveils AADAPT Framework to Sort out Cryptocurrency Threats

Associated: MITRE Publishes Submit-Quantum Cryptography Migration Roadmap

Associated: MITRE CVE Program Will get Final-Hour Funding Reprieve

Associated: MITRE Updates Listing of 25 Most Harmful Software program Vulnerabilities

Security Week News Tags:Common, Hardware, List, MITRE, Updates, Weaknesses

Post navigation

Previous Post: AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
Next Post: Hundreds Targeted in New Atomic macOS Stealer Campaign

Related Posts

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak Security Week News
Marketing, Law Firms Say Data Breaches Impact Over 200,000 People Security Week News
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities Security Week News
Unbound Raises $4 Million to Secure Gen-AI Adoption Security Week News
Compumedics Ransomware Attack Led to Data Breach Impacting 318,000 Security Week News
eSIM Hack Allows for Cloning, Spying  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CPAP Medical Data Breach Impacts 90,000 People
  • Hundreds Targeted in New Atomic macOS Stealer Campaign
  • MITRE Updates List of Most Common Hardware Weaknesses
  • AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
  • Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CPAP Medical Data Breach Impacts 90,000 People
  • Hundreds Targeted in New Atomic macOS Stealer Campaign
  • MITRE Updates List of Most Common Hardware Weaknesses
  • AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
  • Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News