Description
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, an out-of-bounds read vulnerability was reported in the BLE ATT Prepare Write handling of the BLE provisioning transport (protocomm_ble). The issue can be triggered by a remote BLE client while the device is in provisioning mode. The transport accumulated prepared-write fragments in a fixed-size buffer but incorrectly tracked the cumulative length. By sending repeated prepare write requests with overlapping offsets, a remote client could cause the reported length to exceed the allocated buffer size. This inflated length was then passed to provisioning handlers during execute-write processing, resulting in an out-of-bounds read and potential memory corruption. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
Published: 2026-02-04
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Out-of-Bounds Read
Action: Apply Patch
AI Analysis

Impact

The vulnerability involves an out-of-bounds read in the BLE ATT Prepare Write handling of the BLE provisioning transport. A remote BLE client that can send overlapping prepare write requests to a device in provisioning mode can cause the accumulated length of fragments to exceed the fixed buffer size. The inflated length is later used during execute-write processing, leading to an out-of-bounds read and possible memory corruption. This flaw is a classic buffer misuse (CWE-125) that can degrade confidentiality, integrity, or availability of the device if successful. The description states only an out-of-bounds read; no direct evidence of code execution is provided, but memory corruption can lead to fault conditions or crashes.

Affected Systems

The affected products are Espressif’s ESP‑IDF firmware versions 5.1.6, 5.2.6, 5.3.4, 5.4.3, and 5.5.2. The vulnerability is present only while the device is in provisioning mode. The firmware upgrade path to mitigate the issue is to update to the patched releases: 5.1.7, 5.2.7, 5.3.5, 5.4.4, and 5.5.3, or any newer release that incorporates the fix.

Risk and Exploitability

The CVSS score of 6.3 indicates a medium severity. The EPSS score is reported as less than 1%—a very low but nonzero probability of exploitation. The vulnerability requires remote interaction over BLE while the device is in provisioning mode, so an attacker must be able to perform BLE communications with the target. No information is provided that the flaw is exploit dependent on additional privileges or other conditions. The fact that the flaw was identified as a memory corruption vulnerability suggests that exploitation could lead to device instability or crash, but the potential for more serious impact (e.g., code execution) is not documented. The CVE is not listed in the CISA KEV catalog, further suggesting that no active, publicly known exploits are known at this time.

Generated by OpenCVE AI on April 17, 2026 at 23:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ESP‑IDF to at least version 5.1.7, 5.2.7, 5.3.5, 5.4.4, or 5.5.3, ensuring all related patches are applied
  • If an upgrade is not possible, disable BLE provisioning on the device or keep the device out of provisioning mode while not in use
  • Consider limiting BLE access to trusted devices or using network segmentation to reduce the likelihood of a remote BLE client finding the provisioning interface

Generated by OpenCVE AI on April 17, 2026 at 23:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.5.2:*:*:*:*:*:*:*

Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Espressif
Espressif esp-idf
Vendors & Products Espressif
Espressif esp-idf

Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, an out-of-bounds read vulnerability was reported in the BLE ATT Prepare Write handling of the BLE provisioning transport (protocomm_ble). The issue can be triggered by a remote BLE client while the device is in provisioning mode. The transport accumulated prepared-write fragments in a fixed-size buffer but incorrectly tracked the cumulative length. By sending repeated prepare write requests with overlapping offsets, a remote client could cause the reported length to exceed the allocated buffer size. This inflated length was then passed to provisioning handlers during execute-write processing, resulting in an out-of-bounds read and potential memory corruption. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
Title ESF-IDF Has Memory Safety Vulnerabilities in BLE Provisioning
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H'}


Subscriptions

Espressif Esp-idf
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T19:21:38.860Z

Reserved: 2026-02-02T18:21:42.486Z

Link: CVE-2026-25508

cve-icon Vulnrichment

Updated: 2026-02-04T19:21:32.343Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T18:16:09.547

Modified: 2026-02-20T17:13:08.147

Link: CVE-2026-25508

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:30:15Z

Weaknesses