// For flags

CVE-2019-15894

 

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.6, 3.2.x through 3.2.3, and 3.3.x through 3.3.1. An attacker who uses fault injection to physically disrupt the ESP32 CPU can bypass the Secure Boot digest verification at startup, and boot unverified code from flash. The fault injection attack does not disable the Flash Encryption feature, so if the ESP32 is configured with the recommended combination of Secure Boot and Flash Encryption, then the impact is minimized. If the ESP32 is configured without Flash Encryption then successful fault injection allows arbitrary code execution. To protect devices with Flash Encryption and Secure Boot enabled against this attack, a firmware change must be made to permanently enable Flash Encryption in the field if it is not already permanently enabled.

Se detectó un problema en Espressif ESP-IDF versiones 2.x, versiones 3.0.x hasta 3.0.9, versiones 3.1.x hasta 3.1.6, versiones 3.2.x hasta 3.2.3 y versiones 3.3.x hasta 3.3.1. Un atacante que utiliza la inyección de un fallo para interrumpir físicamente la CPU ESP32 puede omitir la comprobación del resumen de Secure Boot en el inicio y arrancar el código no comprobado desde la memoria flash. El ataque de inyección de fallo no deshabilita la función de cifrado de la Flash, por lo que si la ESP32 está configurada con la combinación recomendada de Secure Boot y Flash Encryption, entonces el impacto es minimizado. Si el ESP32 está configurado sin Flash Encryption, entonces la inyección de fallo con éxito permite la ejecución de código arbitrario. Para proteger los dispositivos con Flash Encryption y Secure Boot habilitados contra este ataque, un cambio de firmware se debe realizar para habilitar permanentemente la Flash Encryption en el campo si aún no está habilitado permanentemente.

*Credits: N/A
CVSS Scores
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-09-03 CVE Reserved
  • 2019-10-07 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-09-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-755: Improper Handling of Exceptional Conditions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Espressif
Search vendor "Espressif"
Esp-idf
Search vendor "Espressif" for product "Esp-idf"
>= 3.0 < 3.0.9
Search vendor "Espressif" for product "Esp-idf" and version " >= 3.0 < 3.0.9"
-
Affected
Espressif
Search vendor "Espressif"
Esp-idf
Search vendor "Espressif" for product "Esp-idf"
> 3.1 < 3.1.6
Search vendor "Espressif" for product "Esp-idf" and version " > 3.1 < 3.1.6"
-
Affected
Espressif
Search vendor "Espressif"
Esp-idf
Search vendor "Espressif" for product "Esp-idf"
> 3.2 < 3.2.3
Search vendor "Espressif" for product "Esp-idf" and version " > 3.2 < 3.2.3"
-
Affected
Espressif
Search vendor "Espressif"
Esp-idf
Search vendor "Espressif" for product "Esp-idf"
>= 3.3 < 3.3.1
Search vendor "Espressif" for product "Esp-idf" and version " >= 3.3 < 3.3.1"
-
Affected