Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device's protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://community.st.com/s/question/0D50X00009Xke7aSAB/readout-protection-cracked-on-stm32 | vendor advisory |
https://www.usenix.org/conference/woot17/workshop-program/presentation/obermaier | third party advisory exploit |
https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | third party advisory exploit |