Hacking a GE fridge with a hardened STM32: Bypassing new protections to extract flash memory. 🧊🪛👨‍💻🪠💾

Security researchers Mark Omo and James Rowley present how they bypassed flash readout protection on an STM32G0 microcontroller while researching a control board from a GE 25.1 CU refrigerator.

Directly reading flash causes a hard fault and locks the memory. Glitching attacks that worked on older STM32 chips were fixed in this newer G0 series. However, SRAM and CPU registers were still readable.

During boot, the firmware performs a CRC integrity check over flash memory, using registers for computation. By analyzing millions of captured CPU states and mapping CRC transitions forward and backward, the authors reconstructed 100% of the application flash memory. Wow!

Pretty cool, what do you think? :) Enjoy the talk, and please share it with your colleagues and friends!

More details:

Tracing the Untraceable: Extracting Protected Flash With STM32-TraceRip

Slides [PDF]: https://hardwear.io/usa-2025/presentation/TraceRip-Hardwear.pdf

Presentation [Youtube]: https://lnkd.in/dCe7NK8v

Subscribe now

原始链接: https://it4sec.substack.com/p/hacking-a-ge-fridge-with-a-hardened
侵权请联系站方: [email protected]

相关推荐

换一批