18 August 2020 by Phillip Johnston • Last updated 15 August 2023nRF52 processors provides “access port protection” (APPROTECT register) to enable read back protection and to disable the debug interface. When this feature is enabled, a debugger’s read/write access to CPU register and memory mapped addresses is blocked. Access port protection is often set in production firmware to prevent access to debug interfaces on a device. According to Nordic, it cannot be disabled without erasing all RAM and Flash memory. LimitedResults has worked out a method for bypassing APPROTECT and reactivating the SWD interface using voltage glitching to inject a …
Continue reading “nRF52 Security Vulnerability: APPROTECT Bypass”
