Vulnerability Description
On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| St | Stm32L0 Firmware | - |
| St | Stm32L0 | - |
| St | Stm32L1 Firmware | - |
| St | Stm32L1 | - |
| St | Stm32F4 Firmware | - |
| St | Stm32F4 | - |
| St | Stm32L4 Firmware | - |
| St | Stm32L4 | - |
| St | Stm32F7 Firmware | - |
| St | Stm32F7 | - |
| St | Stm32H7 Firmware | - |
| St | Stm32H7 | - |
Related Weaknesses (CWE)
References
- https://www.usenix.org/system/files/woot19-paper_schink.pdfExploitMitigationThird Party Advisory
- https://www.usenix.org/system/files/woot19-paper_schink.pdfExploitMitigationThird Party Advisory
FAQ
What is CVE-2019-14236?
CVE-2019-14236 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU ...
How severe is CVE-2019-14236?
CVE-2019-14236 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-14236?
Check the references section above for vendor advisories and patch information. Affected products include: St Stm32L0 Firmware, St Stm32L0, St Stm32L1 Firmware, St Stm32L1, St Stm32F4 Firmware.