An encryption-bypass issue was discovered on Espressif ESP-IDF devices through 4.2, ESP8266_NONOS_SDK devices through 3.0.3, and ESP8266_RTOS_SDK devices through 3.3. Broadcasting forged beacon frames forces a device to change its authentication mode to OPEN, effectively disabling its 802.11 encryption.
References
Link | Resource |
---|---|
https://github.com/espressif/ESP8266_NONOS_SDK | Third Party Advisory |
https://github.com/espressif/ESP8266_RTOS_SDK | Third Party Advisory |
https://github.com/espressif/esp-idf | Third Party Advisory |
https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors | Exploit Patch Third Party Advisory |
https://github.com/espressif/ESP8266_NONOS_SDK | Third Party Advisory |
https://github.com/espressif/ESP8266_RTOS_SDK | Third Party Advisory |
https://github.com/espressif/esp-idf | Third Party Advisory |
https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/espressif/ESP8266_NONOS_SDK - Third Party Advisory | |
References | () https://github.com/espressif/ESP8266_RTOS_SDK - Third Party Advisory | |
References | () https://github.com/espressif/esp-idf - Third Party Advisory | |
References | () https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors - Exploit, Patch, Third Party Advisory |
Information
Published : 2020-07-23 16:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12638
Mitre link : CVE-2020-12638
CVE.ORG link : CVE-2020-12638
JSON object : View
Products Affected
espressif
- esp-idf
- esp8266_nonos_sdk
- esp8266_rtos_sdk