CVE-2024-53406

Espressif Esp idf v5.3.0 is vulnerable to Insecure Permissions resulting in Authentication bypass. In the reconnection phase, the device reuses the session key from a previous connection session, creating an opportunity for attackers to execute security bypass attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:espressif:esp-idf:5.3.0:*:*:*:*:*:*:*

History

03 Apr 2025, 16:40

Type Values Removed Values Added
References () https://github.com/espressif/esp-idf - () https://github.com/espressif/esp-idf - Product
References () https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md - () https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md - Exploit
First Time Espressif
Espressif esp-idf
CPE cpe:2.3:a:espressif:esp-idf:5.3.0:*:*:*:*:*:*:*

19 Mar 2025, 19:15

Type Values Removed Values Added
Summary
  • (es) Espressif Esp idf v5.3.0 es vulnerable a permisos inseguros, lo que resulta en la omisión de la autenticación. Durante la fase de reconexión, el dispositivo reutiliza la clave de sesión de una sesión anterior, lo que permite a los atacantes ejecutar ataques de omisión de seguridad.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-639

13 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-13 17:15

Updated : 2025-04-03 16:40


NVD link : CVE-2024-53406

Mitre link : CVE-2024-53406

CVE.ORG link : CVE-2024-53406


JSON object : View

Products Affected

espressif

  • esp-idf
CWE
CWE-639

Authorization Bypass Through User-Controlled Key