6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): ADJACENT_NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): HIGH
Activity log
- Created suggestion
ESF-IDF Has Use-after-free Vulnerability in BLE Provisioning
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a use-after-free vulnerability was reported in the BLE provisioning transport (protocomm_ble) layer. The issue can be triggered by a remote BLE client while the device is in provisioning mode. The vulnerability occurred when provisioning was stopped with keep_ble_on = true. In this configuration, internal protocomm_ble state and GATT metadata were freed while the BLE stack and GATT services remained active. Subsequent BLE read or write callbacks dereferenced freed memory, allowing a connected or newly connected client to trigger invalid memory acces. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
References
-
https://github.com/espressif/esp-idf/security/advisories/GHSA-h7r3-gmg9-xjmg x_refsource_CONFIRM
Affected products
- === 5.2.6
- === 5.4.3
- === 5.1.6
- === 5.3.4
- === 5.5.2
Matching in nixpkgs
pkgs.python312Packages.esp-idf-size
None
-
nixos-25.11 2.0.0
pkgs.python313Packages.esp-idf-size
None
pkgs.python314Packages.esp-idf-size
None
-
nixos-unstable -
- nixpkgs-unstable 2.1.0
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>