Espressif ESP-IDF 4.1

CPE Details

Espressif ESP-IDF 4.1
4.1
2021-07-29
14h48 +00:00
2021-07-29
16h27 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:espressif:esp-idf:4.1:-:*:*:*:*:*:*

Informations

Vendor

espressif

Product

esp-idf

Version

4.1

Update

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-28139 2021-09-07 04h27 +00:00 The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload.
8.8
Haute
CVE-2021-28135 2021-09-07 03h56 +00:00 The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (crash) in ESP32 by flooding the target device with LMP Feature Response data.
6.5
Moyen
CVE-2021-28136 2021-09-07 03h52 +00:00 The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of multiple LMP IO Capability Request packets during the pairing process, allowing attackers in radio range to trigger memory corruption (and consequently a crash) in ESP32 via a replayed (duplicated) LMP packet.
6.5
Moyen
CVE-2020-13595 2020-08-31 12h59 +00:00 The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.0 through 4.2 (for ESP32 devices) returns the wrong number of completed BLE packets and triggers a reachable assertion on the host stack when receiving a packet with an MIC failure. An attacker within radio range can silently trigger the assertion (which disables the target's BLE stack) by sending a crafted sequence of BLE packets.
6.5
Moyen
CVE-2020-13594 2020-08-31 12h58 +00:00 The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.2 and earlier (for ESP32 devices) does not properly restrict the channel map field of the connection request packet on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.
6.5
Moyen
CVE-2020-12638 2020-07-23 13h41 +00:00 An encryption-bypass issue was discovered on Espressif ESP-IDF devices through 4.2, ESP8266_NONOS_SDK devices through 3.0.3, and ESP8266_RTOS_SDK devices through 3.3. Broadcasting forged beacon frames forces a device to change its authentication mode to OPEN, effectively disabling its 802.11 encryption.
6.8
Moyen