Cyber Posture

CWE · MITRE source

CWE-1259Improper Restriction of Security Token Assignment

Abstraction: Base · CVEs in our corpus: 14

The System-On-A-Chip (SoC) implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transaction originates from an entity. However, the Security Tokens are improperly protected.

Systems-On-A-Chip (Integrated circuits and hardware engines) implement Security Tokens to differentiate and identify which actions originated from which agent. These actions may be one of the directives: 'read', 'write', 'program', 'reset', 'fetch', 'compute', etc. Security Tokens are assigned to every agent in the System that is capable of generating an action or receiving an action from another agent. Multiple Security Tokens may be assigned to an agent and may be unique based on the agent's trust level or allowed privileges. Since the Security Tokens are integral for the maintenance of security in an SoC, they need to be protected properly. A common weakness afflicting Security Tokens is improperly restricting the assignment to trusted components.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (0)AI

Control Title Family Why it addresses this CWE
No NIST controls proposed yet.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-361114.96.30.61092024-07-25
CVE-2024-365332.09.80.00252024-07-24
CVE-2024-293711.57.50.00022025-12-17
CVE-2025-279551.36.50.00632025-06-02
CVE-2025-513061.36.50.00092025-08-06
CVE-2024-45981.36.50.00092025-09-23
CVE-2025-562071.36.50.00062025-09-30
CVE-2022-235511.15.30.00782022-12-21
CVE-2025-505791.15.30.00072025-08-19
CVE-2025-566761.15.40.00122025-09-30
CVE-2022-235411.05.00.00062022-12-22
CVE-2024-454480.84.10.00032024-09-04
CVE-2024-419480.63.00.00162024-08-01
CVE-2026-402640.52.70.00042026-04-21