Vulnerabilities > Espressif > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-09-07 | CVE-2021-28136 | Out-of-bounds Write vulnerability in Espressif Esp-Idf The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of multiple LMP IO Capability Request packets during the pairing process, allowing attackers in radio range to trigger memory corruption (and consequently a crash) in ESP32 via a replayed (duplicated) LMP packet. | 3.3 |
2021-09-07 | CVE-2021-28135 | Unspecified vulnerability in Espressif Esp-Idf The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (crash) in ESP32 by flooding the target device with LMP Feature Response data. low complexity espressif | 3.3 |
2020-08-31 | CVE-2020-13594 | Improper Input Validation vulnerability in Espressif Esp-Idf The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.2 and earlier (for ESP32 devices) does not properly restrict the channel map field of the connection request packet on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet. | 3.3 |
2020-08-31 | CVE-2020-13595 | Reachable Assertion vulnerability in Espressif Esp-Idf 4.0.0/4.1/4.2 The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.0 through 4.2 (for ESP32 devices) returns the wrong number of completed BLE packets and triggers a reachable assertion on the host stack when receiving a packet with an MIC failure. | 3.3 |
2019-11-14 | CVE-2019-17391 | Improper Handling of Exceptional Conditions vulnerability in Espressif products An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. | 2.1 |
2019-09-04 | CVE-2019-12586 | Unspecified vulnerability in Espressif Arduino-Esp32, Esp-Idf and Esp8266 Nonos SDK The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message. low complexity espressif | 3.3 |
2019-09-04 | CVE-2019-12588 | Improper Input Validation vulnerability in Espressif Arduino Esp8266 and Esp8266 Nonos SDK The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message. | 3.3 |