Get the latest tech news

Zero Day in Microchip SAM Microcontrollers


ATSAM4C32 Contents - 1 Bypassing Lock - Microchip/Atmel SAM4C32 - 1.1 Introduction - 1.2 Why attack the SAM4C32? - 1.3 Locking Mechanism - 1.4 Reset vs Power Cycle - 1.5 Reset Pin as a Side Channel - 1.6 Voltage Fault Injection - 1.7 JTAG Access - 1.8 Other Vulnerable Devices - 1.9 Conclusion - 1.10 Disclosure Bypassing Lock - Microchip/Atmel SAM4C32 Hash Salehi Introduction This write-up will cover analysis of the Microchip (ATMEL) SAM4C32 microcontroller vulnerability that allows an attacker to gain unlocked JTAG access to a previously locked device. This attack appears to affect many devices (though not all) in the SAM family.

This write-up will cover analysis of the Microchip (ATMEL) SAM4C32 microcontroller vulnerability that allows an attacker to gain unlocked JTAG access to a previously locked device. The purple reset trace (nRST) is toggled by an external device and we see the yellow VDDCORE activity that results as the chip boots up. Many devices in the Microchip (ATMEL) SAM Family make use of GPNVM bits to secure access to the JTAG debug interface.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Day

Day

Photo of SAM

SAM

Related news:

News photo

CoreWeave’s Two-Day 65% Pop Helps Investors Forget Tepid IPO

News photo

UK threatens £100K-a-day fines under new cyber bill

News photo

It's five grand a day to miss our S3 exit