Bypassing JTAG Locks on Microchip SAM4C32 via Voltage Glitching
2025-04-02
A security researcher has discovered a voltage glitching attack that bypasses the JTAG lock on the Microchip SAM4C32 microcontroller. The attack exploits the reset pin as a side channel, injecting a voltage glitch during power-up to disable the security bit and gain unlocked JTAG access. This method may be applicable to many SAM series microcontrollers using GPNVM bits for security. The vulnerability is likely difficult to patch, posing a significant threat to devices relying on these microcontrollers.
Hardware
voltage glitching