Dear TI Customer support.
I'm able to lock the JTAG with password using the JTAG Signature1 and JTAG Signature 2 address areas as described in the Usermanual SLAU367N (Section 1.13.2 JTAG and SBW Lock With Password) . I'm using IAR Embedded Workbench and can enter the password under Options-->FET Debugger-->JTAG password and gain full access to the debugger/firmware. If the password is incorrect, the firmware is not erased.
That said, could someone through brute force enter passwords until the IAR JTAG is unlocked? I know via the BSL if the password is incorrect, it does a MASS ERASE. Should the mass erase occur in this instance too?
Please help me understand this possible security flaw.
Thanks,
-Jim P.