Get the latest tech news
Zero Day in Microchip SAM Microcontrollers
ATSAM4C32 Contents - 1 Bypassing Lock - Microchip/Atmel SAM4C32 - 1.1 Introduction - 1.2 Why attack the SAM4C32? - 1.3 Locking Mechanism - 1.4 Reset vs Power Cycle - 1.5 Reset Pin as a Side Channel - 1.6 Voltage Fault Injection - 1.7 JTAG Access - 1.8 Other Vulnerable Devices - 1.9 Conclusion - 1.10 Disclosure Bypassing Lock - Microchip/Atmel SAM4C32 Hash Salehi Introduction This write-up will cover analysis of the Microchip (ATMEL) SAM4C32 microcontroller vulnerability that allows an attacker to gain unlocked JTAG access to a previously locked device. This attack appears to affect many devices (though not all) in the SAM family.
This write-up will cover analysis of the Microchip (ATMEL) SAM4C32 microcontroller vulnerability that allows an attacker to gain unlocked JTAG access to a previously locked device. The purple reset trace (nRST) is toggled by an external device and we see the yellow VDDCORE activity that results as the chip boots up. Many devices in the Microchip (ATMEL) SAM Family make use of GPNVM bits to secure access to the JTAG debug interface.
Or read this on Hacker News