CVE-2024-42483

ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:espressif:esp-now:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-09-12 15:18

Updated : 2024-09-23 14:06


NVD link : CVE-2024-42483

Mitre link : CVE-2024-42483

CVE.ORG link : CVE-2024-42483


JSON object : View

Products Affected

espressif

  • esp-now
CWE
CWE-349

Acceptance of Extraneous Untrusted Data With Trusted Data

CWE-345

Insufficient Verification of Data Authenticity