ID CVE-2020-13463
Summary The flash memory readout protection in Apex Microelectronics APM32F103 devices allows physical attackers to extract firmware via the debug interface and exception handling.
References
Vulnerable Configurations
  • cpe:2.3:o:apexmic:apm32f103_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:apexmic:apm32f103_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:apexmic:apm32f103:-:*:*:*:*:*:*:*
    cpe:2.3:h:apexmic:apm32f103:-:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 10-09-2020 - 14:56)
Impact:
Exploitability:
CWE CWE-755
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc https://www.usenix.org/system/files/woot20-paper-obermaier.pdf
Last major update 10-09-2020 - 14:56
Published 31-08-2020 - 16:15
Last modified 10-09-2020 - 14:56
Back to Top