<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Mitigation for APPPROTECT attack?</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/63136/mitigation-for-appprotect-attack</link><description>Hi, 
 I’m looking at starting a new design that would be based on the nrf52840, however it seems that the flash readout protection is now fairly broken on this device. Are there any mitigation strategies planned or proposed ? Otherwise I may need to look</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Tue, 04 Feb 2025 13:50:37 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/63136/mitigation-for-appprotect-attack" /><item><title>RE: Mitigation for APPPROTECT attack?</title><link>https://devzone.nordicsemi.com/thread/521323?ContentTypeID=1</link><pubDate>Tue, 04 Feb 2025 13:50:37 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f8bbdaa9-5528-4ac0-a973-8f7292744f68</guid><dc:creator>Vincent Bela&amp;#239;che</dc:creator><description>&lt;p&gt;Thank you for your reply, it is crystal clear.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Mitigation for APPPROTECT attack?</title><link>https://devzone.nordicsemi.com/thread/521319?ContentTypeID=1</link><pubDate>Tue, 04 Feb 2025 13:44:35 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:64866cac-502a-4224-a85f-d97151da4a25</guid><dc:creator>J&amp;#248;rgen Holmefjord</dc:creator><description>[quote] but if the bootloader is based on SDK 15.x.x, the SystemInit of the bootloader will not call&amp;nbsp;nrf52_handle_approtect(), it will be called only when the&amp;nbsp;SystemInit of the App is called, but then you have had some sort of SoftReset when the bootloader starts the App, so you are not directly after a hard reset. Does it matter ?[/quote]
&lt;p&gt;Correct, the full protection will not be enabled until the application code runs, meaning that the bootloader is not protected.&lt;/p&gt;
[quote]One more question : does it mean that during the execution of the bootloader the attack mitigation is not done,so there is still some time gap in which the attack would be possible (said otherwise upgrading the bootloader to SDK 17.1.0 would be advisable).[/quote]
&lt;p&gt;Yes, upgrading the bootloader to SDK17.1.0 or the required MDK version is definitely advisable.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Mitigation for APPPROTECT attack?</title><link>https://devzone.nordicsemi.com/thread/508318?ContentTypeID=1</link><pubDate>Tue, 29 Oct 2024 10:06:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:85ac6d10-55fe-4614-b1f1-4cffac709ef7</guid><dc:creator>Vincent Bela&amp;#239;che</dc:creator><description>&lt;p&gt;Dear &lt;a href="https://devzone.nordicsemi.com/members/joh2"&gt;Jørgen Holmefjord&lt;/a&gt;&amp;nbsp;,&lt;/p&gt;
&lt;p&gt;I have a similar question concerning the AppProtect attack mitigation as described by&amp;nbsp;&lt;a href="https://docs.nordicsemi.com/bundle/IN/resource/in_141_v1.1.pdf"&gt;In 141 v1.1&lt;/a&gt;. If I use SDK 17.1.0 for the Application but the booloader is not upgraded and is still based on SDK 15.x.x, will my product benefit from the mitigation. The international notice says &amp;laquo; 4. Perform a hard reset to protect the device. The programmed code from step 2 will write APPROTECT.FORCEPROTECT to Force (0x00). &amp;raquo;, but if the bootloader is based on SDK 15.x.x, the SystemInit of the bootloader will not call&amp;nbsp;nrf52_handle_approtect(), it will be called only when the&amp;nbsp;SystemInit of the App is called, but then you have had some sort of SoftReset when the bootloader starts the App, so you are not directly after a hard reset. Does it matter ?&lt;/p&gt;
&lt;p&gt;One more question : does it mean that during the execution of the bootloader the attack mitigation is not done,so there is still some time gap in which the attack would be possible (said otherwise upgrading the bootloader to SDK 17.1.0 would be advisable).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Mitigation for APPPROTECT attack?</title><link>https://devzone.nordicsemi.com/thread/257409?ContentTypeID=1</link><pubDate>Mon, 29 Jun 2020 13:26:56 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:8d50ec09-0c15-4983-87f7-1826ae40dbed</guid><dc:creator>J&amp;#248;rgen Holmefjord</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;The available information can be found in&amp;nbsp;&lt;a title="IN133 Informational Notice v1.0" href="https://infocenter.nordicsemi.com/pdf/in_133_v1.0.pdf?cp=4_0_2_0"&gt;IN133 Informational Notice v1.0&lt;/a&gt;. For questions about roadmaps and future plans, please contact your regional sales manager.&lt;/p&gt;
&lt;p&gt;If you do not have the contact details, please send me a private message with your location and I will provide you with the information.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;br /&gt;Jørgen&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>