First published: Thu Sep 12 2019(Updated: )
On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
St Stm32l0 Firmware | ||
St Stm32l0 | ||
St Stm32l1 Firmware | ||
St Stm32l1 | ||
St Stm32f4 Firmware | ||
St Stm32f4 | ||
St Stm32l4 Firmware | ||
St Stm32l4 | ||
St Stm32f7 Firmware | ||
St Stm32f7 | ||
St Stm32h7 Firmware | ||
St Stm32h7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14236 is a vulnerability found on STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices where the Proprietary Code Read Out Protection (PCROP) can be defeated.
Proprietary Code Read Out Protection (PCROP) is a software IP protection method used on STMicroelectronics STM32 devices.
The vulnerability affects the STM32 devices by allowing the defeat of the Proprietary Code Read Out Protection (PCROP) by observing CPU registers and the effect of code/instruction execution.
The severity of CVE-2019-14236 is critical with a CVSS score of 9.8.
Currently, there is no known fix available for CVE-2019-14236. It is recommended to follow any updates from STMicroelectronics and apply patches or mitigations as they become available.