<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Need help interpreting vulnerability reports for nRF Connect SDK 2.9.0 - Zephyr 3.7.99</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/127415/need-help-interpreting-vulnerability-reports-for-nrf-connect-sdk-2-9-0---zephyr-3-7-99</link><description>I am working on a project, in which we are using nRF Connect SDK v2.9.0 on a custom board with the nRF5340 SoC. The device is a BLE peripheral implementing a couple of GATT services. 
 While checking the software dependencies in our project for known</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Thu, 26 Mar 2026 22:31:17 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/127415/need-help-interpreting-vulnerability-reports-for-nrf-connect-sdk-2-9-0---zephyr-3-7-99" /><item><title>RE: Need help interpreting vulnerability reports for nRF Connect SDK 2.9.0 - Zephyr 3.7.99</title><link>https://devzone.nordicsemi.com/thread/564136?ContentTypeID=1</link><pubDate>Thu, 26 Mar 2026 22:31:17 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:4fc3f4c7-1ff8-403c-ae32-2eb8d7f56ccd</guid><dc:creator>Kenneth</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;I have pinged the team again. sorry for the delay.&lt;/p&gt;
&lt;p&gt;Kenneth&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Need help interpreting vulnerability reports for nRF Connect SDK 2.9.0 - Zephyr 3.7.99</title><link>https://devzone.nordicsemi.com/thread/564089?ContentTypeID=1</link><pubDate>Thu, 26 Mar 2026 10:32:55 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:e823bf57-cd99-41f5-ad73-90d4753e9ffa</guid><dc:creator>Robbe Vancayseele</dc:creator><description>&lt;p&gt;Hi Kenneth, can you provide any updates on this topic?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Need help interpreting vulnerability reports for nRF Connect SDK 2.9.0 - Zephyr 3.7.99</title><link>https://devzone.nordicsemi.com/thread/563530?ContentTypeID=1</link><pubDate>Wed, 18 Mar 2026 08:39:42 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:b03154f2-32b6-478e-98f4-9b88c9aa5a24</guid><dc:creator>Robbe Vancayseele</dc:creator><description>&lt;p&gt;One thing I would like to add: I believe we are only executing code from flash. So if these exploits allow corruption of data in RAM, but all RAM regions are configured in the SPU without execute permission, these vulnerabilities cannot lead to RCE.&lt;/p&gt;
&lt;p&gt;The problem is I cannot find any good documentation on how the SPU is configured when using Zephyr.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Need help interpreting vulnerability reports for nRF Connect SDK 2.9.0 - Zephyr 3.7.99</title><link>https://devzone.nordicsemi.com/thread/563192?ContentTypeID=1</link><pubDate>Fri, 13 Mar 2026 09:54:53 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a5e7c26f-ed9f-42e7-a0db-7a24eb358bfc</guid><dc:creator>Kenneth</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Let me check internally and get back to you.&lt;/p&gt;
&lt;p&gt;Kenneth&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>