Lucene search

K
cve[email protected]CVE-2020-27212
HistoryMay 21, 2021 - 12:15 p.m.

CVE-2020-27212

2021-05-2112:15:07
CWE-74
web.nvd.nist.gov
22
cve-2020-27212
stm32l4
access control
nvd
security vulnerability

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

STMicroelectronics STM32L4 devices through 2020-10-19 have incorrect access control. The flash read-out protection (RDP) can be degraded from RDP level 2 (no access via debug interface) to level 1 (limited access via debug interface) by injecting a fault during the boot phase.

Affected configurations

NVD
Node
ststm32l412c8Match-
OR
ststm32l412cbMatch-
OR
ststm32l412k8Match-
OR
ststm32l412kbMatch-
OR
ststm32l412r8Match-
OR
ststm32l412rbMatch-
OR
ststm32l412t8Match-
OR
ststm32l412tbMatch-
OR
ststm32l422cbMatch-
OR
ststm32l422kbMatch-
OR
ststm32l422rbMatch-
OR
ststm32l422tbMatch-
OR
ststm32l431cbMatch-
OR
ststm32l431ccMatch-
OR
ststm32l431kbMatch-
OR
ststm32l431kcMatch-
OR
ststm32l431rbMatch-
OR
ststm32l431rcMatch-
OR
ststm32l431vcMatch-
OR
ststm32l432kbMatch-
OR
ststm32l432kcMatch-
OR
ststm32l433cbMatch-
OR
ststm32l433ccMatch-
OR
ststm32l433rbMatch-
OR
ststm32l433rcMatch-
OR
ststm32l433vcMatch-
OR
ststm32l442kcMatch-
OR
ststm32l443ccMatch-
OR
ststm32l443rcMatch-
OR
ststm32l443vcMatch-
OR
ststm32l451ccMatch-
OR
ststm32l451ceMatch-
OR
ststm32l451rcMatch-
OR
ststm32l451reMatch-
OR
ststm32l451vcMatch-
OR
ststm32l451veMatch-
OR
ststm32l452ccMatch-
OR
ststm32l452ceMatch-
OR
ststm32l452rcMatch-
OR
ststm32l452reMatch-
OR
ststm32l452vcMatch-
OR
ststm32l452veMatch-
OR
ststm32l462ceMatch-
OR
ststm32l462reMatch-
OR
ststm32l462veMatch-
OR
ststm32l471qeMatch-
OR
ststm32l471qgMatch-
OR
ststm32l471reMatch-
OR
ststm32l471rgMatch-
OR
ststm32l471veMatch-
OR
ststm32l471vgMatch-
OR
ststm32l471zeMatch-
OR
ststm32l471zgMatch-
OR
ststm32l475rcMatch-
OR
ststm32l475reMatch-
OR
ststm32l475rgMatch-
OR
ststm32l475vcMatch-
OR
ststm32l475veMatch-
OR
ststm32l475vgMatch-
OR
ststm32l476jeMatch-
OR
ststm32l476jgMatch-
OR
ststm32l476meMatch-
OR
ststm32l476mgMatch-
OR
ststm32l476qeMatch-
OR
ststm32l476qgMatch-
OR
ststm32l476rcMatch-
OR
ststm32l476reMatch-
OR
ststm32l476rgMatch-
OR
ststm32l476vcMatch-
OR
ststm32l476veMatch-
OR
ststm32l476vgMatch-
OR
ststm32l476zeMatch-
OR
ststm32l476zgMatch-
OR
ststm32l486jgMatch-
OR
ststm32l486qgMatch-
OR
ststm32l486rgMatch-
OR
ststm32l486vgMatch-
OR
ststm32l486zgMatch-
OR
ststm32l496aeMatch-
OR
ststm32l496agMatch-
OR
ststm32l496qeMatch-
OR
ststm32l496qgMatch-
OR
ststm32l496reMatch-
OR
ststm32l496rgMatch-
OR
ststm32l496veMatch-
OR
ststm32l496vgMatch-
OR
ststm32l496wgMatch-
OR
ststm32l496zeMatch-
OR
ststm32l496zgMatch-
OR
ststm32l4a6agMatch-
OR
ststm32l4a6qgMatch-
OR
ststm32l4a6rgMatch-
OR
ststm32l4a6vgMatch-
OR
ststm32l4a6zgMatch-
AND
ststm32cubel4_firmwareRange1.16.0

4.4 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Related for CVE-2020-27212