Lucene search

K
EspressifEsp8266 Nonos Sdk

4 matches found

CVE
CVE
added 2019/09/04 8:15 p.m.208 views

CVE-2019-12586

The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

6.5CVSS6.4AI score0.03703EPSS
CVE
CVE
added 2019/09/04 12:15 p.m.127 views

CVE-2019-12588

The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted...

6.5CVSS6.4AI score0.00206EPSS
CVE
CVE
added 2019/09/04 12:15 p.m.125 views

CVE-2019-12587

The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames...

8.1CVSS8AI score0.00106EPSS
CVE
CVE
added 2020/07/23 4:15 p.m.36 views

CVE-2020-12638

An encryption-bypass issue was discovered on Espressif ESP-IDF devices through 4.2, ESP8266_NONOS_SDK devices through 3.0.3, and ESP8266_RTOS_SDK devices through 3.3. Broadcasting forged beacon frames forces a device to change its authentication mode to OPEN, effectively disabling its 802.11 encryp...

6.8CVSS6.7AI score0.0004EPSS