ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
References
Link | Resource |
---|---|
https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef | Patch |
https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj | Exploit Third Party Advisory |
Configurations
History
23 Sep 2024, 14:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:espressif:esp-now:*:*:*:*:*:*:*:* | |
Summary |
|
|
CWE | CWE-345 | |
First Time |
Espressif
Espressif esp-now |
|
References | () https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef - Patch | |
References | () https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj - Exploit, Third Party Advisory |
12 Sep 2024, 15:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-12 15:18
Updated : 2024-09-23 14:06
NVD link : CVE-2024-42483
Mitre link : CVE-2024-42483
CVE.ORG link : CVE-2024-42483
JSON object : View
Products Affected
espressif
- esp-now