This list is not exhaustive, there may be more that are vulnerable and do not show up in this main overview of devices provided by Microchip. Only the '''bold''' ones are confirmed, the others are assumed vulnerable because the datasheet specifies the use of GPNVM bits for security.
* '''SAM E70/S70/V70/V71'''* '''SAM 4C'''* SAM 4E* SAM 4N* '''SAM 4S'''* SAM G51/G54/G55* SAM 3X/3A
The following datasheets were reviewed and '''''did not''''' show the use of GPNVM bits for security protection. This does not mean they are secure, but this specific vulnerability may not be present.
* SAM 4L* SAM L10/L11* SAM L21/L22* SAM C20/C21* SAM D10/D11/D21/DA1/D5x/E5x/D20
----
===Conclusion===
TBDMany devices in the Microchip (ATMEL) SAM Family make use of GPNVM bits to secure access to the JTAG debug interface. This protection can be bypassed using voltage glitching allowing full access to the device. It appears this is a low-level hardware bug, likely not patchable in the field.
=== Disclosure ===
Full disclosure at time of discovery via YouTube. Enjoy!<br>
<youtube width="640" height="360">IOD5voFTAz8</youtube>
<br />