Nordic Semiconductor nRF52840 devices through 2020-10-19 have improper protection against physical side channels. The flash read-out protection (APPROTECT) can be bypassed by injecting a fault during the boot phase.
References
Link | Resource |
---|---|
https://eprint.iacr.org/2021/640 | Third Party Advisory |
https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf | Third Party Advisory |
https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ | Third Party Advisory |
https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html | Third Party Advisory |
https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | Third Party Advisory |
https://eprint.iacr.org/2021/640 | Third Party Advisory |
https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf | Third Party Advisory |
https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ | Third Party Advisory |
https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html | Third Party Advisory |
https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://eprint.iacr.org/2021/640 - Third Party Advisory | |
References | () https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf - Third Party Advisory | |
References | () https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ - Third Party Advisory | |
References | () https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html - Third Party Advisory | |
References | () https://www.aisec.fraunhofer.de/en/FirmwareProtection.html - Third Party Advisory |
03 May 2022, 16:04
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 |
08 Jun 2021, 16:59
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf - Third Party Advisory | |
References | (MISC) https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ - Third Party Advisory | |
References | (MISC) https://eprint.iacr.org/2021/640 - Third Party Advisory | |
References | (MISC) https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html - Third Party Advisory | |
References | (MISC) https://www.aisec.fraunhofer.de/en/FirmwareProtection.html - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 5.7 |
CWE | CWE-74 | |
CPE | cpe:2.3:o:nordicsemi:nrf52840_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:nordicsemi:nrf52840:-:*:*:*:*:*:*:* |
26 May 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 May 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-05-21 13:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-27211
Mitre link : CVE-2020-27211
CVE.ORG link : CVE-2020-27211
JSON object : View
Products Affected
nordicsemi
- nrf52840
- nrf52840_firmware
CWE
CWE-203
Observable Discrepancy