Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

The Raspberry Pi RP2350 Hacking Challenge appears to have been overcome – the hacker was able to access the OTP secret via a flaw in the RISC-V cores to enable debugging


We may have a $20,000 Raspberry Pi and Hextree RP2350 winner Hacking challenge. Engineer Aidan Cullen announces himself Breakthrough RP2350 Presentation at the recent 38th Chaos Conference (38C3), and there GitHub repo It has now been posted to accompany the video here. Colin studied the RP2350 in detail before embarking on a voltage injection fault attack on pin 53 of the RP2350 chip, which managed to power the “permanently disabled” RISC-V cores and the debug access port, enabling him to read the secret.

Raspberry Pi ft RP2350 via Raspberry Pi Pico 2 As successor to RP2040 – With additive protection Features to attract commercial and industrial customers. To promote the new microcontroller, we collaborated with Hextree to design the RP2350 hacking challenge, It was announced at DEF CON in August. This challenge ended on December 31, 2024, but we will have to wait until January 14 for the official announcement of the winner. Colin gave his presentation at 38C3 on December 27 and also shared a GitHub repo with an outline of the hacking process and Python code. However, we don’t know if Colin is the winner, so this may not be a $20,000 winning hack.

Hacking Challenge RP2350

(Image credit: Aidan Cullen)

Specifically, the RP2350 comes with a quartet of new security features, which Raspberry Pi was keen to highlight. These are Secure Boot, TrustZone, Redundancy Coprocessor (RCP), and Glitch Detectors. The challengers have hidden a secret on one of these “fully secured” chips, which will be made available to hackers who apply, and the first provable success story will receive $20,000 and the fame of being the winner of the challenge. Attacks using hardware and/or software means were permitted under competition rules, so the situation was almost unthinkable.

Hacking Challenge RP2350

(Image credit: Aidan Cullen)

The Raspberry Pi and Hextree will hide the secret in the RP2350’s on-chip OTP (one-time programmable) memory, which is said to be a binary code that is set once but never forgotten. Picotool was used to write the secret code to the OTP. The RP2350’s OTP memory was then locked behind the hardware protection feature Page Locks, and was set to an “inaccessible” state of “13:12” according to the table above. The firmware was also signed, with Secure Boot enabled, and they disabled the chip’s debugging feature, so prying eyes couldn’t access the secret via the Serial Wire Debug (SWD) interface. Furthermore, all other operating switches were disabled, and the RP2350 fault detector was turned on and then set to the highest sensitivity level. It definitely looks like it has been closed.

Leave a Reply

Your email address will not be published. Required fields are marked *