nRF52 Security Vulnerability: APPROTECT Bypass

18 August 2020 by Phillip Johnston • Last updated 15 August 2023nRF52 processors provides “access port protection” (APPROTECT register) to enable read back protection and to disable the debug interface. When this feature is enabled, a debugger’s read/write access to CPU register and memory mapped addresses is blocked. Access port protection is often set in production firmware to prevent access to debug interfaces on a device. According to Nordic, it cannot be disabled without erasing all RAM and Flash memory. LimitedResults has worked out a method for bypassing APPROTECT and reactivating the SWD interface using voltage glitching to inject a …

To access this content, you must purchase a Membership - check out the different options here. If you're a member, log in.