On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register.
References
Link Resource
https://www.usenix.org/conference/woot19/presentation/schink Exploit Third Party Advisory
https://www.usenix.org/system/files/woot19-paper_schink.pdf Exploit Mitigation Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-09-24T18:14:47

Updated: 2019-09-24T18:14:47

Reserved: 2019-07-22T00:00:00


Link: CVE-2019-14239

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-09-24T19:15:11.333

Modified: 2019-09-25T13:45:18.193


Link: CVE-2019-14239

JSON object: View

cve-icon Redhat Information

No data.

CWE