Defeating Flash Access Controls (FAC) on NXP Kinetis Devices: Leveraging Load Instructions to Expose Protected Code

Defeating Flash Access Controls (FAC) on NXP Kinetis Devices: Leveraging Load Instructions to Expose Protected Code

CVE-2019-14239 · MEDIUM Severity

CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by leveraging a load instruction inside the execute-only region to expose the protected code into a CPU register.

Learn more about our Web Application Penetration Testing UK.