This CWE category includes vulnerabilities related to the physical execution of cryptographic protocols and other hardware-based security measures like PUFs and RNGs.
The vulnerabilities within this particular group are associated with the physical execution of cryptographic protocols and other hardware-based security measures, such as physical unclonable functions (PUFs) and random number generators (RNGs).