Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-27212


STMicroelectronics STM32L4 devices through 2020-10-19 have incorrect access control. The flash read-out protection (RDP) can be degraded from RDP level 2 (no access via debug interface) to level 1 (limited access via debug interface) by injecting a fault during the boot phase.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.0, requiring local system access to exploit but requires specific conditions to be met without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 95 products from st, from st, from st and 92 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2021, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2021-05-21T12:15:07.730

Last Modified

2024-11-21T05:20:51.937

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.0 (HIGH)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.4

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-74

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System st stm32cubel4_firmware ≤ 1.16.0 Yes
Hardware st stm32l412c8 - No
Hardware st stm32l412cb - No
Hardware st stm32l412k8 - No
Hardware st stm32l412kb - No
Hardware st stm32l412r8 - No
Hardware st stm32l412rb - No
Hardware st stm32l412t8 - No
Hardware st stm32l412tb - No
Hardware st stm32l422cb - No
Hardware st stm32l422kb - No
Hardware st stm32l422rb - No
Hardware st stm32l422tb - No
Hardware st stm32l431cb - No
Hardware st stm32l431cc - No
Hardware st stm32l431kb - No
Hardware st stm32l431kc - No
Hardware st stm32l431rb - No
Hardware st stm32l431rc - No
Hardware st stm32l431vc - No
Hardware st stm32l432kb - No
Hardware st stm32l432kc - No
Hardware st stm32l433cb - No
Hardware st stm32l433cc - No
Hardware st stm32l433rb - No
Hardware st stm32l433rc - No
Hardware st stm32l433vc - No
Hardware st stm32l442kc - No
Hardware st stm32l443cc - No
Hardware st stm32l443rc - No
Hardware st stm32l443vc - No
Hardware st stm32l451cc - No
Hardware st stm32l451ce - No
Hardware st stm32l451rc - No
Hardware st stm32l451re - No
Hardware st stm32l451vc - No
Hardware st stm32l451ve - No
Hardware st stm32l452cc - No
Hardware st stm32l452ce - No
Hardware st stm32l452rc - No
Hardware st stm32l452re - No
Hardware st stm32l452vc - No
Hardware st stm32l452ve - No
Hardware st stm32l462ce - No
Hardware st stm32l462re - No
Hardware st stm32l462ve - No
Hardware st stm32l471qe - No
Hardware st stm32l471qg - No
Hardware st stm32l471re - No
Hardware st stm32l471rg - No
Hardware st stm32l471ve - No
Hardware st stm32l471vg - No
Hardware st stm32l471ze - No
Hardware st stm32l471zg - No
Hardware st stm32l475rc - No
Hardware st stm32l475re - No
Hardware st stm32l475rg - No
Hardware st stm32l475vc - No
Hardware st stm32l475ve - No
Hardware st stm32l475vg - No
Hardware st stm32l476je - No
Hardware st stm32l476jg - No
Hardware st stm32l476me - No
Hardware st stm32l476mg - No
Hardware st stm32l476qe - No
Hardware st stm32l476qg - No
Hardware st stm32l476rc - No
Hardware st stm32l476re - No
Hardware st stm32l476rg - No
Hardware st stm32l476vc - No
Hardware st stm32l476ve - No
Hardware st stm32l476vg - No
Hardware st stm32l476ze - No
Hardware st stm32l476zg - No
Hardware st stm32l486jg - No
Hardware st stm32l486qg - No
Hardware st stm32l486rg - No
Hardware st stm32l486vg - No
Hardware st stm32l486zg - No
Hardware st stm32l496ae - No
Hardware st stm32l496ag - No
Hardware st stm32l496qe - No
Hardware st stm32l496qg - No
Hardware st stm32l496re - No
Hardware st stm32l496rg - No
Hardware st stm32l496ve - No
Hardware st stm32l496vg - No
Hardware st stm32l496wg - No
Hardware st stm32l496ze - No
Hardware st stm32l496zg - No
Hardware st stm32l4a6ag - No
Hardware st stm32l4a6qg - No
Hardware st stm32l4a6rg - No
Hardware st stm32l4a6vg - No
Hardware st stm32l4a6zg - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For st's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.