ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
History

Mon, 23 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Espressif
Espressif esp-now
Weaknesses CWE-345
CPEs cpe:2.3:a:espressif:esp-now:*:*:*:*:*:*:*:*
Vendors & Products Espressif
Espressif esp-now

Thu, 12 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
Description ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
Title ESP-NOW Replay Attacks Vulnerability
Weaknesses CWE-349
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-09-12T14:12:18.128Z

Updated: 2024-09-12T16:46:16.388Z

Reserved: 2024-08-02T14:13:04.617Z

Link: CVE-2024-42483

cve-icon Vulnrichment

Updated: 2024-09-12T16:46:13.085Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-12T15:18:22.093

Modified: 2024-09-23T14:06:04.427

Link: CVE-2024-42483

cve-icon Redhat

No data.