The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there is improper access control to those registers.
Extended description
Best practices to prevent this CWE
Phase: Architecture and Design
Design proper policies for hardware register access from software.
Phase: Implementation
Ensure that access control policies for register access are implemented in accordance with the specified design.