<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/62474/will-there-be-new-silicon-version-of-nrf52-to-fix-this-approtect-loophole</link><description>According to this blogpost https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/ the APPROTECT feature to prevent code readout can be circumvent quite easily. What are the plans of Nordic to address that issue? 
 For our project</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Wed, 12 Jan 2022 16:36:19 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/62474/will-there-be-new-silicon-version-of-nrf52-to-fix-this-approtect-loophole" /><item><title>RE: Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/thread/347447?ContentTypeID=1</link><pubDate>Wed, 12 Jan 2022 16:36:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:62fb2b86-d267-4752-b496-9ebf2f6b8e4a</guid><dc:creator>Thomas Peter</dc:creator><description>&lt;p&gt;I just found&amp;nbsp;&lt;a href="https://infocenter.nordicsemi.com/pdf/in_142_v1.1.pdf"&gt;https://infocenter.nordicsemi.com/pdf/in_142_v1.1.pdf&lt;/a&gt;&amp;nbsp;and other notices that confirm this.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/thread/347442?ContentTypeID=1</link><pubDate>Wed, 12 Jan 2022 16:16:09 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8ef9a26b-56da-4c04-b960-f4493278b40c</guid><dc:creator>Thomas Peter</dc:creator><description>&lt;p&gt;nRF52832 hardware revision G and nRF52840 hardware revision B appear to address this issue. Has&amp;nbsp;this loophole been closed in these hardware revisions?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/thread/255047?ContentTypeID=1</link><pubDate>Mon, 15 Jun 2020 13:39:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3349710c-216a-4603-a51c-01c412152380</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;At this moment we don&amp;#39;t have a plan to&amp;nbsp;release a new version of silicon of the nRF52 to&amp;nbsp;prevent this voltage fault infection technique.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt; I just want to emphasise that this attack tampering the voltage condition outside of the normal operation condition of the chip and most of the standard microcontroller circuits&amp;nbsp;don&amp;#39;t have protection against this type of attack.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/thread/255031?ContentTypeID=1</link><pubDate>Mon, 15 Jun 2020 13:09:36 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ca6c15db-63c3-4c38-9de2-0bcef63efd4e</guid><dc:creator>Torsten Robitzki</dc:creator><description>&lt;p&gt;Hi Hung,&lt;/p&gt;
&lt;p&gt;yes there one essential question open: Are there plans to fix this issue in a future hardware version? (and if so, when can we expect to have them available?)&lt;/p&gt;
&lt;p&gt;According to the cited article above, Nordic knows about this issue for 2 month. So I&amp;#39;m sure, that Nordic has plans to either fix this, or to not fix this. Not letting us know, how Nordic is going to handle this, feels&amp;nbsp;unfair.&lt;/p&gt;
&lt;p&gt;Our bootloader used AES GCM, to both decrypt and sign the binaries with a symmetric key that needs to stay private.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/thread/255025?ContentTypeID=1</link><pubDate>Mon, 15 Jun 2020 12:55:19 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ed4aba3e-5f1e-4812-a605-d21ed6d4d23a</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Torsten,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We have released the official Information Notice as pointed by Hugh.&amp;nbsp;&lt;br /&gt;If you have a specific questions please let me know. You may want to convert the case to private if there is sensitive information.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Regarding protecting keys for signed firmware update, please be aware that the key for DFU update stored the bootloader is the public key. The expose of this public key wouldn&amp;#39;t compromise the&amp;nbsp;security protection of the Secure DFU signing scheme. The public key is only used to verify the authenticity and integrity of the image. The attacker can&amp;#39;t use this public key to generate his own DFU package.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/thread/254794?ContentTypeID=1</link><pubDate>Fri, 12 Jun 2020 17:09:39 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:416b4bed-c8b6-441d-8770-05b7e5cb1cc4</guid><dc:creator>hmolesworth</dc:creator><description>&lt;p&gt;There is an updated report from Nordic here:&amp;nbsp;&lt;a href="https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf"&gt;in_133_v1.0.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;What are the implications for crypto keys?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Will there be new silicon version of nrf52 to fix this APPROTECT loophole</title><link>https://devzone.nordicsemi.com/thread/254705?ContentTypeID=1</link><pubDate>Fri, 12 Jun 2020 11:49:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:ae9e481c-856f-4cee-8502-c49fb26923f0</guid><dc:creator>Hung Bui</dc:creator><description>&lt;p&gt;Hi Torsten,&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;We are fully aware of the attack&amp;#39;s disclosure and your concern. We will release a public statement about this attack and the effect on our chip soon. I will keep you updated when we have the statement published. We will continue the discussion after we have the public statement.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>