CVE-2019-15894
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.6, 3.2.x through 3.2.3, and 3.3.x through 3.3.1. An attacker who uses fault injection to physically disrupt the ESP32 CPU can bypass the Secure Boot digest verification at startup, and boot unverified code from flash. The fault injection attack does not disable the Flash Encryption feature, so if the ESP32 is configured with the recommended combination of Secure Boot and Flash Encryption, then the impact is minimized. If the ESP32 is configured without Flash Encryption then successful fault injection allows arbitrary code execution. To protect devices with Flash Encryption and Secure Boot enabled against this attack, a firmware change must be made to permanently enable Flash Encryption in the field if it is not already permanently enabled.
Se detectó un problema en Espressif ESP-IDF versiones 2.x, versiones 3.0.x hasta 3.0.9, versiones 3.1.x hasta 3.1.6, versiones 3.2.x hasta 3.2.3 y versiones 3.3.x hasta 3.3.1. Un atacante que utiliza la inyección de un fallo para interrumpir físicamente la CPU ESP32 puede omitir la comprobación del resumen de Secure Boot en el inicio y arrancar el código no comprobado desde la memoria flash. El ataque de inyección de fallo no deshabilita la función de cifrado de la Flash, por lo que si la ESP32 está configurada con la combinación recomendada de Secure Boot y Flash Encryption, entonces el impacto es minimizado. Si el ESP32 está configurado sin Flash Encryption, entonces la inyección de fallo con éxito permite la ejecución de código arbitrario. Para proteger los dispositivos con Flash Encryption y Secure Boot habilitados contra este ataque, un cambio de firmware se debe realizar para habilitar permanentemente la Flash Encryption en el campo si aún no está habilitado permanentemente.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-09-03 CVE Reserved
- 2019-10-07 CVE Published
- 2024-08-05 CVE Updated
- 2024-09-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Espressif Search vendor "Espressif" | Esp-idf Search vendor "Espressif" for product "Esp-idf" | >= 3.0 < 3.0.9 Search vendor "Espressif" for product "Esp-idf" and version " >= 3.0 < 3.0.9" | - |
Affected
| ||||||
Espressif Search vendor "Espressif" | Esp-idf Search vendor "Espressif" for product "Esp-idf" | > 3.1 < 3.1.6 Search vendor "Espressif" for product "Esp-idf" and version " > 3.1 < 3.1.6" | - |
Affected
| ||||||
Espressif Search vendor "Espressif" | Esp-idf Search vendor "Espressif" for product "Esp-idf" | > 3.2 < 3.2.3 Search vendor "Espressif" for product "Esp-idf" and version " > 3.2 < 3.2.3" | - |
Affected
| ||||||
Espressif Search vendor "Espressif" | Esp-idf Search vendor "Espressif" for product "Esp-idf" | >= 3.3 < 3.3.1 Search vendor "Espressif" for product "Esp-idf" and version " >= 3.3 < 3.3.1" | - |
Affected
|