First published: Tue Sep 24 2019(Updated: )
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nxp Kinetis Kv1x Firmware | ||
NXP Kinetis KV1x | ||
Nxp Kinetis Kv3x Firmware | ||
Nxp Kinetis Kv3x | ||
Nxp Kinetis K8x Firmware | ||
Nxp Kinetis K8x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14239 is a vulnerability on NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices that allows for the defeat of Flash Access Controls (FAC) by exposing protected code into a CPU register.
Flash Access Controls (FAC) is a software IP protection method for execute-only access on NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices.
CVE-2019-14239 can be exploited by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register.
CVE-2019-14239 has a severity rating of 6.6 (medium).
Yes, you can find more information on CVE-2019-14239 at the following references: [link1], [link2].