26 Sep
2020
26 Sep
'20
3:24 a.m.
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On Thursday, September 24, 2020 7:37 PM, grarpamp <grarpamp@gmail.com> wrote: ...
https://media.defense.gov/2020/Sep/15/2002497594/-1/-1/0/CTR-UEFI-SECURE-BOO...
see also: "Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629)" - https://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cv... ''' During our Fault Injection research on the ESP32, we gradually took steps forward in order to identify the required vulnerabilities that allowed us to bypass Secure Boot and Flash Encryption with a single EM glitch. Moreover, we did not only achieve code execution, we also extracted the plain-text flash data from the chip. ''' best regards,