Description
arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, the WebServer Digest authentication implementation in arduino-esp32 computes the authentication hash using the URI field from the client's Authorization header, without verifying that it matches the actual requested URI. This allows an attacker who possesses any valid digest response (computed for URI-A) to authenticate requests to a completely different protected URI (URI-B), bypassing per-resource access control. This vulnerability is fixed in 3.3.8.
Published: 2026-05-12
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WebServer component of the arduino-esp32 core implements HTTP Digest authentication, but it incorrectly uses the URI supplied in the client’s Authorization header to calculate the response hash without verifying that it matches the actual requested resource. This flaw allows an attacker who knows a valid digest response for one protected URI (URI‑A) to replay that response to a different protected URI (URI‑B). The result is a bypass of per‑resource access controls, permitting the attacker to obtain data and services that should be restricted to authenticated users. The vulnerability is the classic authentication bypass weakness identified as CWE‑287.

Affected Systems

Espressif’s Arduino core for the ESP32 family, including ESP32, ESP32‑S2, ESP32‑S3, ESP32‑C3, ESP32‑C6 and ESP32‑H2 microcontrollers. All releases prior to version 3.3.8 are affected. The issue is resolved in release 3.3.8 and later.

Risk and Exploitability

The CVSS score of 7.5 classifies the vulnerability as high severity. EPSS data is currently unavailable, but the flaw resides in a widely exposed WebServer endpoint, making the attack vector most likely be remote over a network connection. An attacker only needs a valid digest response for a legitimate resource; once obtained they can replay it to any other protected URI. Because the vulnerability exploits an authentication weakness rather than a code execution flaw, exploitation is relatively low‑effort for users who can capture or guess a digest challenge, and the impact can be significant for sensitive or confidential resources. The vulnerability is not listed in the CISA KEV catalog at this time, but it remains a high‑risk operational issue for systems that rely on the affected firmware.

Generated by OpenCVE AI on May 12, 2026 at 23:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the arduino‑esp32 core to version 3.3.8 or later, where the digest authentication URI check is implemented correctly.
  • If an upgrade cannot be performed immediately, disable Digest authentication for all protected resources or replace it with a more robust method such as Basic authentication with TLS or token‑based schemes.
  • Narrow network exposure by restricting access to the WebServer to trusted IP ranges or by placing a firewall in front of the device to limit potential remote attackers.

Generated by OpenCVE AI on May 12, 2026 at 23:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Espressif
Espressif arduino-esp32
Vendors & Products Espressif
Espressif arduino-esp32

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Description arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, the WebServer Digest authentication implementation in arduino-esp32 computes the authentication hash using the URI field from the client's Authorization header, without verifying that it matches the actual requested URI. This allows an attacker who possesses any valid digest response (computed for URI-A) to authenticate requests to a completely different protected URI (URI-B), bypassing per-resource access control. This vulnerability is fixed in 3.3.8.
Title arduino-esp32: Digest authentication URI mismatch bypass in WebServer allows cross-resource replay attack
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Espressif Arduino-esp32
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T21:56:08.490Z

Reserved: 2026-04-30T16:44:48.379Z

Link: CVE-2026-42855

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T22:16:35.067

Modified: 2026-05-12T22:16:35.067

Link: CVE-2026-42855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T23:45:25Z

Weaknesses