Логотип exploitDog
bind:CVE-2019-12588
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12588

Количество 2

Количество 2

nvd логотип

CVE-2019-12588

больше 6 лет назад

The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-w5cj-7hxw-2355

больше 3 лет назад

The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12588

The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

CVSS3: 6.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-w5cj-7hxw-2355

The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу