Логотип exploitDog
bind:CVE-2019-17391
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-17391

Количество 3

Количество 3

nvd логотип

CVE-2019-17391

около 6 лет назад

An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and secure boot keys, by injecting a glitch into the power supply of the chip shortly after reset.

CVSS3: 4.6
EPSS: Низкий
github логотип

GHSA-6fg6-6393-xqhq

больше 3 лет назад

An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and secure boot keys, by injecting a glitch into the power supply of the chip shortly after reset.

EPSS: Низкий
fstec логотип

BDU:2022-03985

около 6 лет назад

Уязвимость загрузчика первого этапа Secure Boot микропрограммного обеспечения микроконтроллеров ESP32, позволяющая нарушителю получить ключи безопасной загрузки

CVSS3: 4.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-17391

An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and secure boot keys, by injecting a glitch into the power supply of the chip shortly after reset.

CVSS3: 4.6
0%
Низкий
около 6 лет назад
github логотип
GHSA-6fg6-6393-xqhq

An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and secure boot keys, by injecting a glitch into the power supply of the chip shortly after reset.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-03985

Уязвимость загрузчика первого этапа Secure Boot микропрограммного обеспечения микроконтроллеров ESP32, позволяющая нарушителю получить ключи безопасной загрузки

CVSS3: 4.6
0%
Низкий
около 6 лет назад

Уязвимостей на страницу