Espressif Esp idf v5.3.0 is vulnerable to Insecure Permissions resulting in Authentication bypass. In the reconnection phase, the device reuses the session key from a previous connection session, creating an opportunity for attackers to execute security bypass attacks.
References
Link | Resource |
---|---|
https://github.com/espressif/esp-idf | Product |
https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md | Exploit |
Configurations
History
03 Apr 2025, 16:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/espressif/esp-idf - Product | |
References | () https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md - Exploit | |
First Time |
Espressif
Espressif esp-idf |
|
CPE | cpe:2.3:a:espressif:esp-idf:5.3.0:*:*:*:*:*:*:* |
19 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-639 |
13 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-13 17:15
Updated : 2025-04-03 16:40
NVD link : CVE-2024-53406
Mitre link : CVE-2024-53406
CVE.ORG link : CVE-2024-53406
JSON object : View
Products Affected
espressif
- esp-idf
CWE
CWE-639
Authorization Bypass Through User-Controlled Key