Replay Attack Affecting espressif/esp-now package, versions [0,]
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-ESPRESSIFESPNOW-7945501
- published 13 Sep 2024
- disclosed 12 Sep 2024
- credit Nozomi Networks Labs
Introduced: 12 Sep 2024
CVE-2024-42483 Open this link in a new tabHow to fix?
A fix was pushed into the master
branch but not yet published.
Overview
Affected versions of this package are vulnerable to Replay Attack due to the shared cache mechanism. An attacker can disrupt legitimate communications and inject old or malicious packets by clearing the cache of its legitimate entries and re-injecting previously captured packets.
Note:
According to the maintainers, the fix is not a 100% reliable solution, as an attacker with more effort can still replay old ciphertext. but considering the connectionless nature of ESP-NOW, it's "good enough" for now.