CVE-2017-18347

Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device’s protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection.

Date published : 2018-09-12

https://community.st.com/s/question/0D50X00009Xke7aSAB/readout-protection-cracked-on-stm32

https://www.aisec.fraunhofer.de/en/FirmwareProtection.html