Improper Handling of Exceptional Conditions Affecting espressif/esp-idf package, versions [3.0,3.0.9)(3.1,3.1.6)(3.2,3.2.3)[3.3,3.3.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (37th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ESPRESSIFESPIDF-2364347
  • published26 Jan 2022
  • disclosed7 Oct 2019
  • creditUnknown

Introduced: 7 Oct 2019

CVE-2019-15894  (opens in a new tab)
CWE-755  (opens in a new tab)

How to fix?

Upgrade espressif/esp-idf to version 3.0.9, 3.1.6, 3.2.3, 3.3.1 or higher.

Overview

Affected versions of this package are vulnerable to Improper Handling of Exceptional Conditions. An issue was discovered in Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.6, 3.2.x through 3.2.3, and 3.3.x through 3.3.1. An attacker who uses fault injection to physically disrupt the ESP32 CPU can bypass the Secure Boot digest verification at startup, and boot unverified code from flash. The fault injection attack does not disable the Flash Encryption feature, so if the ESP32 is configured with the recommended combination of Secure Boot and Flash Encryption, then the impact is minimized. If the ESP32 is configured without Flash Encryption then successful fault injection allows arbitrary code execution. To protect devices with Flash Encryption and Secure Boot enabled against this attack, a firmware change must be made to permanently enable Flash Encryption in the field if it is not already permanently enabled.

References

CVSS Scores

version 3.1