A timing side channel was discovered in AT91bootstrap before 3.9.2. It can be exploited by attackers with physical access to forge CMAC values and subsequently boot arbitrary code on an affected system.
                
            References
                    | Link | Resource | 
|---|---|
| https://labs.f-secure.com/advisories/microchip-at91bootstrap/ | Exploit Third Party Advisory | 
| https://github.com/linux4sam/at91bootstrap/commit/7753914c9a622c245f3a3cf2af5e24b6a9904213 | Patch Third Party Advisory | 
Configurations
                    Information
                Published : 2020-09-14 07:15
Updated : 2021-04-08 07:47
NVD link : CVE-2020-11683
Mitre link : CVE-2020-11683
JSON object : View
CWE
                
                    
                        
                        CWE-203
                        
            Observable Discrepancy
Products Affected
                linux4sam
- at91bootstrap
 


