Описание
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register.
Ссылки
- ExploitThird Party Advisory
- ExploitMitigationThird Party Advisory
- ExploitThird Party Advisory
- ExploitMitigationThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:nxp:kinetis_kv1x_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:kinetis_kv1x:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:nxp:kinetis_kv3x_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:kinetis_kv3x:-:*:*:*:*:*:*:*
Конфигурация 3
Одновременно
cpe:2.3:o:nxp:kinetis_k8x_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:nxp:kinetis_k8x:-:*:*:*:*:*:*:*
EPSS
Процентиль: 20%
0.00065
Низкий
6.6 Medium
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 6.6
github
больше 3 лет назад
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register.
EPSS
Процентиль: 20%
0.00065
Низкий
6.6 Medium
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-287