PSIRT

Product Security Incident Response Team

About ST PSIRT

ST's Product Security Incident Response Team (ST PSIRT) supervises the process of accepting and responding to reports of potential security vulnerabilities involving ST hardware and software products.

ST places a high priority on security, and ST PSIRT is committed to rapidly addressing potential security vulnerabilities affecting our products. Our long history and vast experience in security allows ST to perform clear analyses and provide appropriate guidance on mitigations and solutions when applicable.

If you wish to report a potential security vulnerability regarding our products, we encourage you to report it to ST PSIRT by following the steps described on this page.

How to report a potential security vulnerability

To report a potential security vulnerability, please contact ST PSIRT at psirt@st.com

All exchanges and reports must be provided in English.


Because of the sensitive nature of such reporting, ST PSIRT highly encourages all potential security vulnerability reports to be sent encrypted, using the ST PSIRT PGP/GPG Key:

  • Fingerprint: F2B8 13E0 6AD0 CBD0 81B9 FA94 0FEE E399 08AE 602C
  • Public Key File (ZIP, 3 KB)

Free software to read and author PGP/GPG encrypted messages may be obtained from:

IMPORTANT-READ CAREFULLY:

STMicroelectronics N.V., on behalf of itself, its affiliates and subsidiaries, (collectively “ST”) takes all potential security vulnerability reports or other related communications (“Report(s)”) seriously. In order to review Your Report (the terms “You” and “Yours” include your employer, and all affiliates, subsidiaries and related persons or entities) and take actions as deemed appropriate, ST requires that we have the rights and Your permission to do so.

As such, by submitting Your Report to ST, You agree that You have the right to do so, and You grant to ST the rights to use the Report for purposes related to security vulnerability analysis, testing, correction, patching, reporting and any other related purpose or function.

Recommended information to include in your report

To allow ST PSIRT to process the reported potential security vulnerability, you should provide the following information:

  • ST product identification: part number or product reference and version (hardware or software)
  • Complete technical description of the potential vulnerability, including any related known exploits
  • How and when the potential vulnerability was discovered
  • Any public information already published or planned to be published (CVE, academic paper publication, etc.)
  • Your contact information to use during the process

Insufficient information may prevent ST from evaluating the request.

Potential vulnerability management process

Once submitted, ST PSIRT will manage the reported potential security vulnerability according to the following process:

  1. Reporting a new vulnerability: At this stage, ST PSIRT will acknowledge receipt of the reported issue.
  2. Evaluating: ST PSIRT will evaluate the potential vulnerability to understand if there is an issue, analyze it, and set a priority to manage valid issues. ST PSIRT may come back to the submitter in case some information is missing from the original report or if clarification is needed.
  3. Solving: ST PSIRT will investigate potential solutions and mitigations to address valid issues.
  4. Communicating: Once a solution is available (fix or mitigation), ST PSIRT will communicate back to the submitter and others where appropriate.

Public security advisories and bulletins

Documents are only available in English.

Resource title ID Version Latest update

TN1436-ST-PSIRT

2.0

13 Dec 2022

Security advisory TN1457-ST-PSIRT: information about certified STM32Cube embedded software based on open source (TF-M and MCUboot)

TN1457-ST-PSIRT

1.0

21 Mar 23

Security bulletin TN1474-ST-PSIRT: Information on software-based microarchitectural timing side-channel attacks on MCUs with TrustZone for Armv8-M

TN1474-ST-PSIRT

1.0

07 Jun 2023

Security advisory TN1488-ST-PSIRT: OpenThread “Missing Key ID Mode validation when processing 6LoWPAN frames” security vulnerability

TN1488-ST-PSIRT

1.0

11 Oct 2023

Security bulletin TN1489-ST-PSIRT: Physical attacks on STM32 and STM32Cube firmware

TN1489-ST-PSIRT

1.0

09 Oct 2023

Security advisory TN1491-ST-PSIRT: Keccak XKCP SHA-3 reference implementation issue impact on STM32 products

TN1491-ST-PSIRT

2.0

13 Dec 2023

Security advisory TN1492-ST-PSIRT: Bypass of the CKS locking mechanism

TN1492-ST-PSIRT

1.0

11 Oct 2023

Security advisory TN1493-ST-PSIRT: Impersonation in the Passkey entry protocol

TN1493-ST-PSIRT

1.0

11 Oct 2023

Security advisory TN1500-ST-PSIRT: Improper isolation of protected secure resources

TN1500-ST-PSIRT

2.0

02 Feb 2023

Security advisory TN1514-ST-PSIRT: STM32Cube software ETH hardware abstraction layer (HAL) tail pointer management issue

TN1514-ST-PSIRT

1.0

09 Apr 2024

Security advisory TN1518-ST-PSIRT: STM32CubeWB secure memory access

TN1518-ST-PSIRT

1.0

31 May 2024

Security advisory TN1530-ST-PSIRT: ST25TB series tearing issue

TN1530-ST-PSIRT

1.0

31 May 2024

Security advisory TN1528-ST-PSIRT: Impact of Mbed TLS security advisories released between 2022-07 and 2024-01 on STM32 embedded software

TN1528-ST-PSIRT

1.0

14 Jun 2024

Security advisory TN1537-ST-PSIRT: Impact of Azure RTOS version 6.2.1 security advisories on STM32 embedded software

TN1537-ST-PSIRT

1.0

08 Jul 2024

Security advisory TN1529-ST-PSIRT: STM32CubeProgrammer for STM32H563/573 RSSe SFI security enhancement

TN1529-ST-PSIRT

1.0

18 Jul 2024

Security advisory TN1542-ST-PSIRT: Impact of insecure permissions vulnerability in Connectivity Standards Alliance Matter official SDK on X-CUBE-MATTER software expansion package

TN1542-ST-PSIRT

1.0

10 Sept 2024

Security advisory TN1552-ST-PSIRT: STSW-SAFEA1-MW buffer overflow

 

TN1552-ST-PSIRT

1.0

1 Oct 2024

Security advisory SA0022 SFI security enhancement for STM32H5, STM32U5, STM32L5, and STM32WL5

 

SA0022

1.0

24 Oct 2024

Security Bulletin SB0023 EUCLEAK protection statement for STMicroelectronics certified products

 

SB0023

1.0

25 Oct 2024

Security Bulletin SB0032 Applicability of Trusted Firmware-M vulnerabilities on STM32Cube packages

 

SB0032

1.0

19 Dec 2024

Security Bulletin SB0033 Applicability of MbedTLS vulnerabilities on STM32Cube packages

SB0033

1.0

19 Dec 2024

Public security advisories and bulletins

Documents are only available in English.

TN1457-ST-PSIRT

1.0

21 Mar 23

TN1474-ST-PSIRT

1.0

07 Jun 2023

TN1488-ST-PSIRT

1.0

11 Oct 2023

TN1489-ST-PSIRT

1.0

09 Oct 2023

TN1491-ST-PSIRT

2.0

13 Dec 2023

TN1492-ST-PSIRT

1.0

11 Oct 2023

TN1493-ST-PSIRT

1.0

11 Oct 2023

TN1500-ST-PSIRT

2.0

02 Feb 2023

TN1514-ST-PSIRT

1.0

09 Apr 2024

TN1518-ST-PSIRT

1.0

31 May 2024

TN1530-ST-PSIRT

1.0

31 May 2024

TN1528-ST-PSIRT

1.0

14 Jun 2024

TN1537-ST-PSIRT

1.0

08 Jul 2024

TN1529-ST-PSIRT

1.0

18 Jul 2024

TN1542-ST-PSIRT

1.0

10 Sept 2024

TN1552-ST-PSIRT

1.0

1 Oct 2024

SA0022

1.0

24 Oct 2024

SB0023

1.0

25 Oct 2024

SB0032

1.0

19 Dec 2024

SB0033

1.0

19 Dec 2024

Read more
Read less

The above should not be deemed a complete list of all security incidents related to ST Products. If you wish to find out more about the security status of a particular ST Product, please contact your ST sales representative.