CVE-2019-14236

On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution.
References
Link Resource
https://www.usenix.org/system/files/woot19-paper_schink.pdf Exploit Mitigation Third Party Advisory
https://www.usenix.org/system/files/woot19-paper_schink.pdf Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:st:stm32l0_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:st:stm32l0:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:st:stm32l1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:st:stm32l1:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:st:stm32f4_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:st:stm32f4:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:st:stm32l4_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:st:stm32l4:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:st:stm32f7_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:st:stm32f7:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:st:stm32h7_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:st:stm32h7:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:26

Type Values Removed Values Added
References () https://www.usenix.org/system/files/woot19-paper_schink.pdf - Exploit, Mitigation, Third Party Advisory () https://www.usenix.org/system/files/woot19-paper_schink.pdf - Exploit, Mitigation, Third Party Advisory

Information

Published : 2019-09-12 18:15

Updated : 2024-11-21 04:26


NVD link : CVE-2019-14236

Mitre link : CVE-2019-14236

CVE.ORG link : CVE-2019-14236


JSON object : View

Products Affected

st

  • stm32l4_firmware
  • stm32f4_firmware
  • stm32f7_firmware
  • stm32h7_firmware
  • stm32f4
  • stm32h7
  • stm32l4
  • stm32l1
  • stm32l1_firmware
  • stm32l0_firmware
  • stm32l0
  • stm32f7
CWE
CWE-863

Incorrect Authorization