{ "schema_version": "1.4.0", "id": "GHSA-5f4r-g29m-jw8q", "modified": "2022-05-13T01:10:26Z", "published": "2022-05-13T01:10:26Z", "aliases": [ "CVE-2017-18347" ], "details": "Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device's protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18347" }, { "type": "WEB", "url": "https://community.st.com/s/question/0D50X00009Xke7aSAB/readout-protection-cracked-on-stm32" }, { "type": "WEB", "url": "https://www.aisec.fraunhofer.de/en/FirmwareProtection.html" }, { "type": "WEB", "url": "https://www.usenix.org/conference/woot17/workshop-program/presentation/obermaier" } ], "database_specific": { "cwe_ids": [ "CWE-362" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-09-12T15:29:00Z" } }