CVE-2021-29414

CVSS V2 Low 3.6 CVSS V3 Medium 6.1
Description
STMicroelectronics STM32L4 devices through 2021-03-29 have incorrect physical access control.
Overview
  • CVE ID
  • CVE-2021-29414
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-05-21T12:15:07
  • Last Modified Date
  • 2021-06-08T18:15:50
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:st:stm32cubel4_firmware:*:*:*:*:*:*:*:* 1 OR 1.17.0
cpe:2.3:h:st:stm32l412c8:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l412cb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l412k8:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l412kb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l412r8:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l412rb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l412t8:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l412tb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l422cb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l422kb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l422rb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l422tb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l431cb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l431cc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l431kb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l431kc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l431rb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l431rc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l431vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l432kb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l432kc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l433cb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l433cc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l433rb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l433rc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l433vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l442kc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l443cc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l443rc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l443vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l451cc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l451ce:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l451rc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l451re:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l451vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l451ve:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l452cc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l452ce:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l452rc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l452re:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l452vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l452ve:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l462ce:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l462re:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l462ve:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471qe:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471qg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471re:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471rg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471ve:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471vg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471ze:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l471zg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l475rc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l475re:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l475rg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l475vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l475ve:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l475vg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476je:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476jg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476me:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476mg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476qe:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476qg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476rc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476re:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476rg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476vc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476ve:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476vg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476ze:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l476zg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l486jg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l486qg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l486rg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l486vg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l486zg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496ae:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496ag:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496qe:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496qg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496re:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496rg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496ve:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496vg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496wg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496ze:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l496zg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l4a6ag:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l4a6qg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l4a6rg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l4a6vg:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:st:stm32l4a6zg:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:N/I:P/A:P
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 3.6
  • Severity
  • LOW
  • Exploitability Score
  • 3.9
  • Impact Score
  • 4.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
  • Attack Vector
  • PHYSICAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 6.1
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 0.9
  • Impact Score
  • 5.2
History
Created Old Value New Value Data Type Notes
2022-05-10 07:12:17 Added to TrackCVE
2022-12-05 02:44:21 2021-05-21T12:15Z 2021-05-21T12:15:07 CVE Published Date updated
2022-12-05 02:44:21 2021-06-08T18:15:50 CVE Modified Date updated
2022-12-05 02:44:21 Analyzed Vulnerability Status updated