On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution.
References
Link | Resource |
---|---|
https://www.usenix.org/system/files/woot19-paper_schink.pdf | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2019-09-12 11:15
Updated : 2019-09-16 11:19
NVD link : CVE-2019-14236
Mitre link : CVE-2019-14236
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
st
- stm32f7_firmware
- stm32f4_firmware
- stm32f7
- stm32l4_firmware
- stm32h7
- stm32l4
- stm32h7_firmware
- stm32l1
- stm32f4
- stm32l0
- stm32l0_firmware
- stm32l1_firmware