TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NRF52 Firmware Readout and Reverse-Engineering Now Possible

143 pointsby cvs268almost 5 years ago

14 comments

ohazialmost 5 years ago
This isn&#x27;t actually as bad as it sounds.<p>Almost all general purpose microcontrollers with &quot;readout protection&quot; are vulnerable to glitching attacks like this one. It may be a stretch to claim that <i>most</i> embedded engineers understand this, but successful attacks like this one are published at least a few times a year, and eventually one of them targets a part that you&#x27;ve used before.<p>All it does is force you to think about your threat model. You shouldn&#x27;t keep sensitive or long-term secrets on a microcontroller and expect them to remain safe. Transient things like BLE session keys? Sure, whatever.<p>It&#x27;s why you don&#x27;t see (responsible) people designing HSMs using parts like these, and why extreme skepticism is warranted when people try to build things like cryptocurrency hardware wallets out of Arduino-caliber parts.<p>There are special classes of parts with more robust security features that you should consider using if you need anything resembling an HSM. Even those parts get broken from time to time, and those breaks are rarely fixable without new hardware.
评论 #23486426 未加载
评论 #23486434 未加载
评论 #23488684 未加载
评论 #23487058 未加载
hamandcheesealmost 5 years ago
I can’t help but read this and think that this is a good thing... especially knowing Logitech uses these chips and the scummy things they have been known to do to sabotage the resale value of the hardware they make. [0]<p>Is there any meaningful downside to anyone but Nordic and Nordic’s customers?<p>[0]<a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;homeautomation&#x2F;comments&#x2F;esiv9b&#x2F;psa_to_harmony_hub_users_avoid_unnecessary&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;homeautomation&#x2F;comments&#x2F;esiv9b&#x2F;psa_...</a>
评论 #23486347 未加载
评论 #23490572 未加载
usrusralmost 5 years ago
I&#x27;ve been trying to come up with scenarios where someone relying on that security would suffer worse from this revelation than merely enabling hardware clone manufacturing.<p>(Note that most of those cases are very far from where you would typically find an NRF52)<p>Decryption keys for &quot;broadcast&quot; style DRM schemes? Kind of bad, but usually those also have implementations on far more open hardware, it wouldn&#x27;t be the weakest link.<p>A Yubikey-like second factor configured only for presence? When you can take a soldering iron to the device you might just as well keep the one you already have. It would only make a difference for elaborate attacks involving more than one copy of the destroyed original (e.g. sneaking a clone back to the original owner). I&#x27;d argue that it retains 98% of the security upside compared to not using a second factor and would still come ahead of many weaker second factors.<p>A Yubikey-like second factor configured to require on-device decryption of its keys? (e.g. built in PIN pad) Bad because the readout would enable unthrottled attemps, but still only terrible if the resulting key isn&#x27;t throttled otherwise (e.g. bad for decrypting some offline storage).<p>An anti-tampering signature for content production, e.g. camera hardware confirming that a pictue is based on actual photons hitting a CCD? Bad, definitely.<p>An encapsulated root CA in its CEO&#x27;s pocket? Someone will get fired, but it won&#x27;t be the right person.<p>I&#x27;m sure that this list could be longer, but so far I don&#x27;t see any overlap with the usual application domain of NRF52.
评论 #23488321 未加载
paddlesteameralmost 5 years ago
With this, devices that use NRF52 chips are now open to investigators. I think we&#x27;ll learn of more vulnerabilities of BLE devices whose shitty implementations are hidden in those SoCs. I&#x27;m more than excited about the next post about Logitech Pro G mouse.<p>Making things open is a good thing on society&#x27;s security.
评论 #23489050 未加载
btashtonalmost 5 years ago
I have come to just accept the firmware will be read out in most microcontrollers unless they are specifically built to hold secrets. Maybe you can keep someone from copying your code for a little while, but eventually it will happen and you should have some other value that protects your business.<p>NRF, STM32, PSoC, ESP32, Xilinx. All of them have silicon or ROM errata that leak the firmware or the encryption around it.
评论 #23486289 未加载
reitanqildalmost 5 years ago
&gt; Nordic Semiconductor and LimitedResults did not agree on a responsible disclosure. <i>That’s life.</i><p>Short and sweet, kind of.
评论 #23486140 未加载
评论 #23486109 未加载
TaylorAlexanderalmost 5 years ago
“This security investigation presents a way to bypass the APPROTECT on a protected nRF52840, in order to reactivate the Serial Wire Debug Interface (SWD), offering full debug capabilities on the target (R&#x2F;W access to Flash&#x2F;RAM&#x2F;Registers, Code Exec and reprogramming). All the nRF52 versions are impacted.<p>Due to its intrinsic characteristics, the vulnerability cannot be patched without Silicon redesign, leading to a countless number of vulnerable devices on the field forever.”<p>Ooof.
评论 #23485983 未加载
tsomctlalmost 5 years ago
&gt; My low-cost voltage gliching is an homemade HW electronic system, dedicated to perform fault injections in a suitable manner. The total cost of this electronic board is less than 5$, which proves fault injection is a very low cost technique and can be achieved by limited hackers.<p>Has he released the schematic for this? I&#x27;m thinking it&#x27;s just a small npn pulling the power pin to ground, and controlled by a microcontroller.<p>Edit: He talks about his glitcher here: <a href="https:&#x2F;&#x2F;limitedresults.com&#x2F;2019&#x2F;05&#x2F;pwn-mbedtls-on-esp32-dfa-warm-up&#x2F;" rel="nofollow">https:&#x2F;&#x2F;limitedresults.com&#x2F;2019&#x2F;05&#x2F;pwn-mbedtls-on-esp32-dfa-...</a>
floatbothalmost 5 years ago
Custom open firmware for Logitech mice incoming? :D
rkagereralmost 5 years ago
TLDR: Soldered onto some pins, identified power usage pattern during boot sequence characteristic of Flash read, wrote a search program to glitch the chip at just the right moment when it loads the protection flag.<p>Apparently able to make exploit persistent, and demo coming up in future post on a real consumer product (Logitech Mouse). Couldn&#x27;t reach agreement with Nordic on a responsible disclosure mechanism.
评论 #23487029 未加载
评论 #23488436 未加载
chrissnellalmost 5 years ago
Are these SoC devices often used to act as serial-over-BLE bridges? I have a barbecue controller from ThermoWorks that I have been trying to reverse engineer. Sniffing BLE has been pretty useless for this thing because it appears to be using BLE as a mechanism to do basic serial comms. I would like to understand more how these serial implementations work and to find some resources that I could use to capture the protocol.
评论 #23489712 未加载
als0almost 5 years ago
The following Nordic chips seem to have gone through some security evaluation <a href="https:&#x2F;&#x2F;www.psacertified.org&#x2F;certified-products&#x2F;?_company=nordic-semiconductor" rel="nofollow">https:&#x2F;&#x2F;www.psacertified.org&#x2F;certified-products&#x2F;?_company=no...</a>
75efhjitscalmost 5 years ago
&gt; Nordic Semiconductor and LimitedResults did not agree on a responsible disclosure. That’s life.<p>Can you elaborate more on how this would work?
评论 #23510446 未加载
embiowway1228almost 5 years ago
<a href="https:&#x2F;&#x2F;autochess.onl&#x2F;" rel="nofollow">https:&#x2F;&#x2F;autochess.onl&#x2F;</a>