Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jr8m-qx83-r6p3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload.

The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload.

EPSS

Процентиль: 67%
0.00541
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость реализации Bluetooth Classic среды для разработки IoT приложений espressif esp-idf, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 67%
0.00541
Низкий