Skip to content

Iskuri/PN553-Signature-Bypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

This repository contains an exploit by Christopher Wade for the firmware update mechanism of the PN553 NFC chip that was common in smartphones such as the Pixel 3 XL.

PN547, PN548, PN551 and PN5180 and other chips in the series are likely also vulnerable. The PN544 uses an 8051 core instead of Cortex M, and it is unknown whether it has a similar vulnerability. The SN100 adds support for firmware encryption, and this exploit has never worked there.

This bug was first publicly described in this blog post and at the 25 minute mark of this Defcon 29 Lecture on cracking secure bootloaders.

The bug was reported to NXP in June of 2020, then patched over the next year until the vulnerability was published in August 2021. This exploit was published in August of 2023.

About

A tool that bypasses PN553 signature protection

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages