Vulnerability Description
ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Esphome | Esphome Firmware | < 2021.9.2 |
| Espressif | Esp32 | - |
| Espressif | Esp8266 | - |
Related Weaknesses (CWE)
References
- https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8aPatchThird Party Advisory
- https://github.com/esphome/esphome/releases/tag/2021.9.2Release NotesThird Party Advisory
- https://github.com/esphome/esphome/security/advisories/GHSA-48mj-p7x2-5jfmPatchThird Party Advisory
- https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8aPatchThird Party Advisory
- https://github.com/esphome/esphome/releases/tag/2021.9.2Release NotesThird Party Advisory
- https://github.com/esphome/esphome/security/advisories/GHSA-48mj-p7x2-5jfmPatchThird Party Advisory
FAQ
What is CVE-2021-41104?
CVE-2021-41104 is a vulnerability with a CVSS score of 7.5 (HIGH). ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over...
How severe is CVE-2021-41104?
CVE-2021-41104 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41104?
Check the references section above for vendor advisories and patch information. Affected products include: Esphome Esphome Firmware, Espressif Esp32, Espressif Esp8266.