‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Thursday, September 24, 2020 7:37 PM, grarpamp <[email protected]> wrote:
...
> https://media.defense.gov/2020/Sep/15/2002497594/-1/-1/0/CTR-UEFI-SECURE-BOOT-CUSTOMIZATION-20200915.PDF/CTR-UEFI-SECURE-BOOT-CUSTOMIZATION-20200915.PDF


see also:
"Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629)"
- 
https://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/

'''
During our Fault Injection research on the ESP32, we gradually took steps 
forward in order to identify the required vulnerabilities that allowed us to 
bypass Secure Boot and Flash Encryption with a single EM glitch. Moreover, we 
did not only achieve code execution, we also extracted the plain-text flash 
data from the chip.
'''

best regards,

Reply via email to