SB2024072946 - Multiple vulnerabilities in esp-idf



SB2024072946 - Multiple vulnerabilities in esp-idf

Published: July 29, 2024 Updated: September 6, 2024

Security Bulletin ID SB2024072946
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Adjecent network
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Infinite loop (CVE-ID: CVE-2024-24746)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in GATT server. A remote attacker can consume all available system resources and cause denial of service conditions.


2) Input validation error (CVE-ID: CVE-2020-26142)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. A remote attacker on the local network can inject arbitrary network packets, independent of the network configuration.


3) Improper authentication (CVE-ID: CVE-2023-52160)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in the PEAP implementation. A remote attacker can bypass authentication process by sending an EAP-TLV Success packet instead of starting Phase 2.

Successful exploitation of the vulnerability requires that wpa_supplicant is configured to not verify the network's TLS certificate during Phase 1 authentication.


Remediation

Install update from vendor's website.