CVE-2020-13469

The flash memory readout protection in Gigadevice GD32VF103 devices allows physical attackers to extract firmware via the debug interface by utilizing the CPU.
References
Link Resource
https://www.usenix.org/system/files/woot20-paper-obermaier.pdf Exploit Technical Description Third Party Advisory
https://www.usenix.org/system/files/woot20-paper-obermaier.pdf Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:gigadevice:gd32vf103_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:gigadevice:gd32vf103:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://www.usenix.org/system/files/woot20-paper-obermaier.pdf - Exploit, Technical Description, Third Party Advisory () https://www.usenix.org/system/files/woot20-paper-obermaier.pdf - Exploit, Technical Description, Third Party Advisory

Information

Published : 2020-08-31 16:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13469

Mitre link : CVE-2020-13469

CVE.ORG link : CVE-2020-13469


JSON object : View

Products Affected

gigadevice

  • gd32vf103_firmware
  • gd32vf103
CWE
CWE-668

Exposure of Resource to Wrong Sphere