6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): ADJACENT_NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): HIGH
Activity log
- Created suggestion
ESF-IDF Has Memory Safety Vulnerabilities in BLE Provisioning
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, an out-of-bounds read vulnerability was reported in the BLE ATT Prepare Write handling of the BLE provisioning transport (protocomm_ble). The issue can be triggered by a remote BLE client while the device is in provisioning mode. The transport accumulated prepared-write fragments in a fixed-size buffer but incorrectly tracked the cumulative length. By sending repeated prepare write requests with overlapping offsets, a remote client could cause the reported length to exceed the allocated buffer size. This inflated length was then passed to provisioning handlers during execute-write processing, resulting in an out-of-bounds read and potential memory corruption. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
References
-
https://github.com/espressif/esp-idf/security/advisories/GHSA-9j5x-rf36-54x9 x_refsource_CONFIRM
Affected products
- === 5.2.6
- === 5.4.3
- === 5.1.6
- === 5.3.4
- === 5.5.2
Matching in nixpkgs
pkgs.python312Packages.esp-idf-size
None
-
nixos-25.11 2.0.0
pkgs.python313Packages.esp-idf-size
None
pkgs.python314Packages.esp-idf-size
None
-
nixos-unstable -
- nixpkgs-unstable 2.1.0
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>