6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): ADJACENT_NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): HIGH
Activity log
- Created suggestion
ESF-IDF is Vulnerable to WPS Enrollee Fragment Integer Underflow
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a vulnerability exists in the WPS (Wi-Fi Protected Setup) Enrollee implementation where malformed EAP-WSC packets with truncated payloads can cause integer underflow during fragment length calculation. When processing EAP-Expanded (WSC) messages, the code computes frag_len by subtracting header sizes from the total packet length. If an attacker sends a packet where the EAP Length field covers only the header and flags but omits the expected payload (such as the 2-byte Message Length field when WPS_MSG_FLAG_LEN is set), frag_len becomes negative. This negative value is then implicitly cast to size_t when passed to wpabuf_put_data(), resulting in a very large unsigned value. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
References
-
https://github.com/espressif/esp-idf/security/advisories/GHSA-m2h2-683f-9mw7 x_refsource_CONFIRM
Affected products
- === 5.3.4
- === 5.1.6
- === 5.4.3
- === 5.2.6
- === 5.5.2
Matching in nixpkgs
pkgs.python312Packages.esp-idf-size
None
-
nixos-25.11 2.0.0
pkgs.python313Packages.esp-idf-size
None
pkgs.python314Packages.esp-idf-size
None
-
nixos-unstable -
- nixpkgs-unstable 2.1.0
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>