CVE-2024-42483
CVSS V2 None
CVSS V3 None
Description
ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
Overview
- CVE ID
- CVE-2024-42483
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-09-12T14:12:18.128Z
- Last Modified Date
- 2024-09-12T16:46:16.388Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj | x_refsource_CONFIRM |
https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-42483 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42483 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-09-13 13:17:53 | Added to TrackCVE |