CVE-2020-13465

The security protection in Gigadevice GD32F103 devices allows physical attackers to redirect the control flow and execute arbitrary code via the debug interface.
References
Link Resource
https://www.usenix.org/system/files/woot20-paper-obermaier.pdf Exploit Technical Description Third Party Advisory
https://www.usenix.org/system/files/woot20-paper-obermaier.pdf Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:gigadevice:gd32f103_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:gigadevice:gd32f103:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://www.usenix.org/system/files/woot20-paper-obermaier.pdf - Exploit, Technical Description, Third Party Advisory () https://www.usenix.org/system/files/woot20-paper-obermaier.pdf - Exploit, Technical Description, Third Party Advisory

Information

Published : 2020-08-31 16:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13465

Mitre link : CVE-2020-13465

CVE.ORG link : CVE-2020-13465


JSON object : View

Products Affected

gigadevice

  • gd32f103
  • gd32f103_firmware
CWE
CWE-20

Improper Input Validation