Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-12587
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-04 Sep, 2019 | 12:15
Updated At-24 Aug, 2020 | 17:37

The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames via a rogue access point.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.1HIGH
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Primary2.04.8MEDIUM
AV:A/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

espressif
espressif
>>esp-idf>>Versions from 2.0.0(inclusive) to 4.0.0(inclusive)
cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*
espressif
espressif
>>esp8266_nonos_sdk>>Versions from 2.2.0(inclusive) to 3.1.0(inclusive)
cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-327Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/Matheus-Garbelini/esp32_esp8266_attackscve@mitre.org
Exploit
Third Party Advisory
https://github.com/espressifcve@mitre.org
Product
https://matheus-garbelini.github.io/home/post/zero-pmk-installation/cve@mitre.org
Patch
Third Party Advisory
Change History
0Changes found

Details not found