Cyber Posture

CWE · MITRE source

CWE-1244Internal Asset Exposed to Unsafe Debug Access Level or State

Abstraction: Base · CVEs in our corpus: 11

The product uses physical debug or test interfaces with support for multiple access levels, but it assigns the wrong debug access level to an internal asset, providing unintended access to the asset from untrusted debug agents.

Debug authorization can have multiple levels of access, defined such that different system internal assets are accessible based on the current authorized debug level. Other than debugger authentication (e.g., using passwords or challenges), the authorization can also be based on the system state or boot stage. For example, full system debug access might only be allowed early in boot after a system reset to ensure that previous session data is not accessible to the authenticated debugger.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (1)AI

Control Title Family Why it addresses this CWE
SC-41Port and I/O Device AccessSCPrevents internal assets from being exposed through debug or test access levels by removing those interfaces.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2020-53721.88.60.00662020-07-06
CVE-2024-01141.68.10.00012025-03-05
CVE-2025-428781.68.20.00082025-12-09
CVE-2026-296421.67.80.00012026-04-20
CVE-2022-322591.36.50.00192022-06-14
CVE-2025-233371.36.70.00022025-09-17
CVE-2025-202381.26.00.00012025-08-14
CVE-2025-232520.94.50.00202025-06-18
CVE-2025-233010.84.20.00022025-09-04
CVE-2025-233020.84.20.00022025-09-04
CVE-2025-367550.00.00.00032025-12-12