Vulnerability CVE-2019-12586


Published: 2019-09-04

Description:
The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:A/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
2.9/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Espressif -> Arduino-esp32 
Espressif -> Esp-idf 

 References:
https://github.com/espressif
https://github.com/Matheus-Garbelini/esp32_esp8266_attacks
https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/

Copyright 2024, cxsecurity.com

 

Back to Top