Lucene search

K
EspressifEsp-idf4.0.0

4 matches found

CVE
CVE
added 2019/09/04 8:15 p.m.230 views

CVE-2019-12586

The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

6.5CVSS6.4AI score0.03703EPSS
CVE
CVE
added 2019/09/04 12:15 p.m.147 views

CVE-2019-12587

The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames...

8.1CVSS8AI score0.00106EPSS
CVE
CVE
added 2020/08/31 3:15 p.m.54 views

CVE-2020-13595

The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.0 through 4.2 (for ESP32 devices) returns the wrong number of completed BLE packets and triggers a reachable assertion on the host stack when receiving a packet with an MIC failure. An attacker within radio range can si...

6.5CVSS6.3AI score0.00237EPSS
CVE
CVE
added 2021/01/12 3:15 a.m.41 views

CVE-2020-16146

Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.7, 3.2.x through 3.2.3, 3.3.x through 3.3.2, and 4.0.x through 4.0.1 has a Buffer Overflow in BluFi provisioning in btc_blufi_recv_handler function in blufi_prf.c. An attacker can send a crafted BluFi protocol Write Attribute command to ...

7.5CVSS7.7AI score0.00354EPSS