The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.
References
Link | Resource |
---|---|
https://github.com/Matheus-Garbelini/esp32_esp8266_attacks | Exploit Third Party Advisory |
https://github.com/espressif | Third Party Advisory |
https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ | Exploit Patch Third Party Advisory |
https://github.com/Matheus-Garbelini/esp32_esp8266_attacks | Exploit Third Party Advisory |
https://github.com/espressif | Third Party Advisory |
https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Matheus-Garbelini/esp32_esp8266_attacks - Exploit, Third Party Advisory | |
References | () https://github.com/espressif - Third Party Advisory | |
References | () https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ - Exploit, Patch, Third Party Advisory |
Information
Published : 2019-09-04 20:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12586
Mitre link : CVE-2019-12586
CVE.ORG link : CVE-2019-12586
JSON object : View
Products Affected
espressif
- arduino-esp32
- esp-idf
- esp8266_nonos_sdk
CWE