Vulnerability Description
The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Espressif | Arduino-Esp32 | <= 1.0.2 |
| Espressif | Esp-Idf | >= 2.0.0, <= 4.0.0 |
| Espressif | Esp8266 Nonos Sdk | >= 2.2.0, <= 3.0.0 |
References
- https://github.com/Matheus-Garbelini/esp32_esp8266_attacksExploitThird Party Advisory
- https://github.com/espressifThird Party Advisory
- https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ExploitPatchThird Party Advisory
- https://github.com/Matheus-Garbelini/esp32_esp8266_attacksExploitThird Party Advisory
- https://github.com/espressifThird Party Advisory
- https://matheus-garbelini.github.io/home/post/esp32-esp8266-eap-crash/ExploitPatchThird Party Advisory
FAQ
What is CVE-2019-12586?
CVE-2019-12586 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows ...
How severe is CVE-2019-12586?
CVE-2019-12586 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-12586?
Check the references section above for vendor advisories and patch information. Affected products include: Espressif Arduino-Esp32, Espressif Esp-Idf, Espressif Esp8266 Nonos Sdk.