Cyber Posture

CWE · MITRE source

CWE-1242Inclusion of Undocumented Features or Chicken Bits

Abstraction: Base · CVEs in our corpus: 14

The device includes chicken bits or undocumented features that can create entry points for unauthorized actors.

A common design practice is to use undocumented bits on a device that can be used to disable certain functional security features. These bits are commonly referred to as "chicken bits". They can facilitate quick identification and isolation of faulty components, features that negatively affect performance, or features that do not provide the required controllability for debug and test. Another way to achieve this is through implementation of undocumented features.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (7)AI

Showing the 6 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SA-12Supply Chain ProtectionSARequires transparency and verification of delivered components, limiting undocumented features or debug hooks introduced upstream.
SA-13TrustworthinessSADiscourages undocumented features or chicken bits by demanding transparency and verification that only intended, documented behavior is present.
SA-20Customized Development of Critical ComponentsSADeveloping critical components internally avoids undocumented features and chicken bits present in vendor hardware or software.
CM-8System Component InventoryCMRequiring an inventory that accurately reflects the system forces documentation of all components, making inclusion of undocumented features or chicken bits harder to achieve without detection.
PM-30Supply Chain Risk Management StrategyPMReview and update processes include scrutiny of undocumented features or debug mechanisms provided by component manufacturers.
SR-10Inspection of Systems or ComponentsSRInspection can uncover undocumented features or chicken bits that result from tampering or malicious insertion.
Show 1 more broadly-applicable controls
SA-21Developer ScreeningSARequiring screened developers with proper access limits the introduction of undocumented features or debug 'chicken bits' that could be exploited later.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2025-550502.09.80.00062025-09-09
CVE-2025-121762.09.80.00062025-10-24
CVE-2023-36341.88.80.00102026-04-16
CVE-2025-417561.68.10.00042026-03-09
CVE-2024-525641.57.50.00242024-12-05
CVE-2025-224501.57.50.00242025-01-22
CVE-2026-247141.57.50.00102026-01-30
CVE-2024-544571.47.20.00092024-12-18
CVE-2024-21031.36.50.00082024-04-04
CVE-2024-70111.36.50.00092024-09-27
CVE-2025-417541.36.50.00022026-03-09
CVE-2025-525481.04.90.00042025-09-02
CVE-2017-202040.10.00.00872025-10-15
CVE-2021-44690.00.00.00322025-11-14