René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

261 lines
6.9 KiB
JSON

{
"id": "CVE-2019-14238",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-24T18:15:10.797",
"lastModified": "2019-09-25T13:32:08.987",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "On STMicroelectronics STM32F7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated with a debug probe via the Instruction Tightly Coupled Memory (ITCM) bus."
},
{
"lang": "es",
"value": "En los dispositivos STMicroelectronics STM32F7, la Proprietary Code Read Out Protection (PCROP) (un m\u00e9todo de protecci\u00f3n IP de software) puede ser superada con una sonda de depuraci\u00f3n por medio del bus Instruction Tightly Coupled Memory (ITCM)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32l0_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8173AA-028B-44C2-81C0-B216289CFFC1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32l0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB597A37-93DE-445A-BD00-9F5593BEC0FD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32l1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6CBFC4A-597C-4CFB-B84C-058E3B1E6D2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32l1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEDC40CE-9909-4F22-A8BD-1074C89440DA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32f4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C862BA8C-8B56-4326-B912-2FDF80549651"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32f4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440D2164-B326-4399-94C2-67705F0046AB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32l4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D00F3B0-486C-4B40-9E10-DCFBFBC5AA98"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32l4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E10B907C-88E9-402C-96F5-8D30F06CB26C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32f7_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EF9C325-7B9D-45F5-9CD0-684B87A82D60"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32f7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8059CBFB-6323-4CC2-979C-1A01433C01A9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:st:stm32h7_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0FCD79-5A82-40AF-B221-2EF6601D92F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:st:stm32h7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2F16E8-9CEC-4F15-B6E6-F5006DE30B5F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usenix.org/conference/woot19/presentation/schink",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.usenix.org/system/files/woot19-paper_schink.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}