On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution.
References
Link | Resource |
---|---|
https://www.usenix.org/system/files/woot19-paper_schink.pdf | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2019-09-12 18:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-14236
Mitre link : CVE-2019-14236
CVE.ORG link : CVE-2019-14236
JSON object : View
Products Affected
st
- stm32l0_firmware
- stm32h7
- stm32f4_firmware
- stm32f4
- stm32l1
- stm32l4
- stm32l0
- stm32l4_firmware
- stm32l1_firmware
- stm32f7_firmware
- stm32f7
- stm32h7_firmware
CWE
CWE-863
Incorrect Authorization