Vulnerability CVE-2019-12587


Published: 2019-09-04

Description:
The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames via a rogue access point.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:A/AC:L/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.8/10
4.9/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Espressif -> Esp-idf 
Espressif -> Esp8266 nonos sdk 

 References:
https://github.com/espressif
https://github.com/Matheus-Garbelini/esp32_esp8266_attacks
https://matheus-garbelini.github.io/home/post/zero-pmk-installation/

Copyright 2024, cxsecurity.com

 

Back to Top