ЗБ
Yes, resurrection of JTAG/SWD interface on protected platforms has always been a sensitive topic in embedded security.
This security investigation presents a way to bypass the APPROTECT on a protected nRF52840, in order to reactivate the Serial Wire Debug Interface (SWD), offering full debug capabilities on the target (R/W access to Flash/RAM/Registers, Code Exec and reprogramming). All the nRF52 versions are impacted.
Due to its intrinsic characteristics, the vulnerability cannot be patched without Silicon redesign, leading to a countless number of vulnerable devices on the field forever.
https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass/
https://limitedresults.com/2020/06/nrf52-debug-resurrection-approtect-bypass-part-2/