Description
On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by observing CPU registers and the effect of code/instruction execution.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-5479 | On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by observing CPU registers and the effect of code/instruction execution. |
References
| Link | Providers |
|---|---|
| https://www.usenix.org/system/files/woot19-paper_schink.pdf |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:12:43.376Z
Reserved: 2019-07-22T00:00:00.000Z
Link: CVE-2019-14237
No data.
Status : Modified
Published: 2019-09-12T18:15:12.007
Modified: 2024-11-21T04:26:16.020
Link: CVE-2019-14237
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD