ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0071 ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.
Github GHSA Github GHSA GHSA-48mj-p7x2-5jfm Basic auth bypass in esphome
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T02:59:31.350Z

Reserved: 2021-09-15T00:00:00

Link: CVE-2021-41104

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-28T16:15:08.413

Modified: 2024-11-21T06:25:28.620

Link: CVE-2021-41104

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses