René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

253 lines
6.8 KiB
JSON

{
"id": "CVE-2019-14236",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-12T18:15:11.927",
"lastModified": "2019-09-16T18:19:12.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution."
},
{
"lang": "es",
"value": "En los dispositivos STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7 y STM32H7, Proprietary Code Read Out Protection (PCROP) (un m\u00e9todo de protecci\u00f3n IP de software) puede ser superado observando los registros de la CPU y el efecto de la ejecuci\u00f3n de c\u00f3digo e instrucci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32l0_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8173AA-028B-44C2-81C0-B216289CFFC1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32l0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB597A37-93DE-445A-BD00-9F5593BEC0FD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32l1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CBFC4A-597C-4CFB-B84C-058E3B1E6D2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32l1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEDC40CE-9909-4F22-A8BD-1074C89440DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32f4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C862BA8C-8B56-4326-B912-2FDF80549651"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32f4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440D2164-B326-4399-94C2-67705F0046AB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32l4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D00F3B0-486C-4B40-9E10-DCFBFBC5AA98"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32l4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E10B907C-88E9-402C-96F5-8D30F06CB26C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32f7_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF9C325-7B9D-45F5-9CD0-684B87A82D60"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32f7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8059CBFB-6323-4CC2-979C-1A01433C01A9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32h7_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0FCD79-5A82-40AF-B221-2EF6601D92F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32h7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2F16E8-9CEC-4F15-B6E6-F5006DE30B5F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usenix.org/system/files/woot19-paper_schink.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}