Implentation of Read-back protection on nRF52840

Greetings,

We are trying to enable/implement the read-back protection feature of the nRF52840 SoC and during this process we came accross this reported vulnerability of the read-back mechanism shared by Nordic regarding Read-Back Protection: Informational Notice (IN) - Vulnerability of the nRF52 series.

Based on this vulnerability which states that:

A device that programmatically configured APPROTECT can have that configuration circumvented and program memory containing program instructions can be read out of the device

According to this, we cannot use the CONFIG_NRF_APPROTECT_LOCK=y configuration option or any other (programmatical) methods (Steps 1,2 in the guide) mentioned in this guide by Nordic to enable the read-back protection. Is this correct?

If so, what is the correct way to set/enable the readback protection for the nRF52840 device without being exposed to the aforementioned vulnerability?

I am looking forward to hearing from you.

Best regards,

Stavros 

Parents Reply
  • Hi Sigurd,

    Sorry to get back to this so much later, but I just managed to find the time to get back to this.

    This information you shared is clear, so just enabling CONFIG_NRF_APPROTECT_LOCK=y is enough to enable the readback protection so that third parties cannot read the FW from the nRF52840 if it is a revision 3 chip, if I understand correctly. 

    What if the chips used are an older revision, for example, nRF52840 revision 2?

    What is necessary to be done so that it is ensured readback protection is enabled and no one is allowed to read back our FW?

    Thank you very much for your support and I look forward to hearing from you!

    Best regards,

    Stavros

Children
Related