MEDIUM · 6.5

CVE-2019-12586

The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows ...

Vulnerability Description

The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

CVSS Score

6.5

MEDIUM

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
EspressifArduino-Esp32<= 1.0.2
EspressifEsp-Idf>= 2.0.0, <= 4.0.0
EspressifEsp8266 Nonos Sdk>= 2.2.0, <= 3.0.0

References

FAQ

What is CVE-2019-12586?

CVE-2019-12586 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows ...

How severe is CVE-2019-12586?

CVE-2019-12586 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-12586?

Check the references section above for vendor advisories and patch information. Affected products include: Espressif Arduino-Esp32, Espressif Esp-Idf, Espressif Esp8266 Nonos Sdk.