🤮 Silicon Labs Key Management – **The Weaknesses**

I’ll offer this…

:mag: Documented Security Vulnerabilities in Silicon Labs’ Gecko Platform

A notable security issue was identified in the Gecko Bootloader of Silicon Labs’ platform, specifically within the Over-the-Air (OTA) update parser. This vulnerability could potentially allow unauthorized code execution during the firmware update process. The detailed analysis and implications of this vulnerability are discussed in the following blog post:​Quarkslab’s blog+1Mouser+1

  • Breaking Secure Boot on the Silicon Labs Gecko Platform: This article presents an in-depth examination of the vulnerability found in the Gecko Bootloader’s OTA parser, highlighting potential risks associated with firmware updates. ​Quarkslab’s blog

Responded with …
Silicon Labs has implemented various methods for secure key storage, including the use of Physically Unclonable Functions (PUFs) to generate device-specific keys. However, it’s important to note that not all devices across their product line uniformly implement these advanced security features. In some instances, key material may end up being stored unencrypted in standard memory, depending on the specific device and its configuration. ​Silicon Labs+2Silicon Labs+2Silicon Labs+2

The Jury is still out…
To mitigate potential security risks, Silicon Labs introduced the Secure Vault™ technology, an integrated suite of security features designed to protect devices, data, and intellectual property from evolving threats. Secure Vault includes capabilities such as secure key management, anti-tamper protection, and secure boot with rollback prevention.

HTH

GL :slight_smile: PJ :v: