3 results (0.003 seconds)

CVSS: 7.0EPSS: 0%CPEs: 95EXPL: 0

21 May 2021 — STMicroelectronics STM32L4 devices through 2020-10-19 have incorrect access control. The flash read-out protection (RDP) can be degraded from RDP level 2 (no access via debug interface) to level 1 (limited access via debug interface) by injecting a fault during the boot phase. Los dispositivos STMicroelectronics STM32L4 versión hasta el 2020-10-19, presentan un control de acceso incorrecto. La protección de lectura flash (RDP) se puede degradar desde el nivel 2 de RDP (sin acceso por medio de la interf... • https://eprint.iacr.org/2021/640 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 6.1EPSS: 0%CPEs: 95EXPL: 0

21 May 2021 — STMicroelectronics STM32L4 devices through 2021-03-29 have incorrect physical access control. Los dispositivos STMicroelectronics STM32L4 hasta el 2021-03-29 presentan un control de acceso físico incorrecto • https://eprint.iacr.org/2021/640 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 5.9EPSS: 0%CPEs: 22EXPL: 0

20 Jan 2021 — Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure. El ataque de Bleichenbacher en el relleno PKCS #1 v1.5 para RSA en la expansión del software de la biblioteca de firmware criptográfico STM32 para STM3... • http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •