Nordic Semiconductor nRF52840 devices through 2020-10-19 have improper protection against physical side channels. The flash read-out protection (APPROTECT) can be bypassed by injecting a fault during the boot phase.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://www.aisec.fraunhofer.de/en/FirmwareProtection.html | third party advisory |
https://eprint.iacr.org/2021/640 | third party advisory |
https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ | third party advisory |
https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf | third party advisory |
https://www.aisec.fraunhofer.de/de/das-institut/wissenschaftliche-exzellenz/security-and-trust-in-open-source-security-tokens.html | third party advisory |