On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution.
References
Link | Resource |
---|---|
https://www.usenix.org/system/files/woot19-paper_schink.pdf | Exploit Mitigation Third Party Advisory |
https://www.usenix.org/system/files/woot19-paper_schink.pdf | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 04:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.usenix.org/system/files/woot19-paper_schink.pdf - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2019-09-12 18:15
Updated : 2024-11-21 04:26
NVD link : CVE-2019-14236
Mitre link : CVE-2019-14236
CVE.ORG link : CVE-2019-14236
JSON object : View
Products Affected
st
- stm32l4_firmware
- stm32f4_firmware
- stm32f7_firmware
- stm32h7_firmware
- stm32f4
- stm32h7
- stm32l4
- stm32l1
- stm32l1_firmware
- stm32l0_firmware
- stm32l0
- stm32f7
CWE
CWE-863
Incorrect Authorization