<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security vulnerability issues</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/123771/security-vulnerability-issues</link><description>Hi， 
 Background Information: 
 
 
 Our product, BLE near-infrared device , is undergoing CRA (Cyber Resilience Act) compliance assessment—specifically for the EU RED Cybersecurity Standard . 
 
 
 OpenCVE is a platform providing CVE data, focusing on</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 20 Aug 2025 18:56:42 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/123771/security-vulnerability-issues" /><item><title>RE: Security vulnerability issues</title><link>https://devzone.nordicsemi.com/thread/546259?ContentTypeID=1</link><pubDate>Wed, 20 Aug 2025 18:56:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d8346de1-5c14-468d-a851-9dfe714de9bf</guid><dc:creator>Emil Lenngren</dc:creator><description>&lt;p&gt;Regarding the first issue, I was pretty sure that issue was purely due to bad software and not the hardware itself? Note that the software feeds the hw a sequence of modular multiplications to perform, depending on the bits of the private key. The hw executes every individual modular multiplication in constant time, but the issue was that the software enqueues a different number of modular multiplications depending on the bit pattern of the private key. By changing the high level algorithm to one that always schedules the same number of modular multiplications, the result is that you get a constant time implementation, which resolves the issue, right?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Security vulnerability issues</title><link>https://devzone.nordicsemi.com/thread/545902?ContentTypeID=1</link><pubDate>Mon, 18 Aug 2025 10:37:11 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ecba4106-8b31-4f27-aa52-e55b5e373f20</guid><dc:creator>Einar Thorsrud</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regarding CVE-2021-29415, this is not fixed in the nRF52840 HW.&amp;nbsp; However, the&amp;nbsp;risk is limited as this is mostly a theoretical attack, which may not be practical outside of a lab environment:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;No other code can execute on the device at the same time.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Nordic acknowledges the weakness documented in CVE-2021-29415 about the Arm CryptoCell310 IP.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The nRF52840 was designed back in 2015 and physical attacks were not part of the threat model for the device.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Regardign&amp;nbsp;CVE-2020-27211, this has been fixed in revision 3 of the nRF52840. See &lt;a href="https://docs.nordicsemi.com/bundle/IN/resource/in_141_v1.1.pdf"&gt;IN141 Informational Notice v1.1&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Einar&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>