Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-25507
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-04 Feb, 2026 | 18:16
Updated At-20 Feb, 2026 | 17:12

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a use-after-free vulnerability was reported in the BLE provisioning transport (protocomm_ble) layer. The issue can be triggered by a remote BLE client while the device is in provisioning mode. The vulnerability occurred when provisioning was stopped with keep_ble_on = true. In this configuration, internal protocomm_ble state and GATT metadata were freed while the BLE stack and GATT services remained active. Subsequent BLE read or write callbacks dereferenced freed memory, allowing a connected or newly connected client to trigger invalid memory acces. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Primary3.16.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Type: Secondary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Type: Primary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CPE Matches

espressif
espressif
>>esp-idf>>5.1.6
cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.2.6
cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.3.4
cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.4.3
cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.5.2
cpe:2.3:a:espressif:esp-idf:5.5.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-416Primarysecurity-advisories@github.com
CWE ID: CWE-416
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/espressif/esp-idf/commit/0540c85140c2c06c0cbecc8843277ea676d5c4a9security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/1ff264abf2504cade46f0ce3a03f821310bcf6d7security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/47552ff4fd824caf38215468ebd2f31fb5f36d70security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/4c3fdcd316f780bab4ae5aa73c9626ea9fe24ac6security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/894c28afe3f2f8f31ff25b64191883517dddb5cfsecurity-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/cde7b7362adc15638c141c249681cbe5d23de663security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/dba9a7dc01e4dab14c77d328f6a6f46369aeee63security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/security/advisories/GHSA-h7r3-gmg9-xjmgsecurity-advisories@github.com
Third Party Advisory
Hyperlink: https://github.com/espressif/esp-idf/commit/0540c85140c2c06c0cbecc8843277ea676d5c4a9
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/1ff264abf2504cade46f0ce3a03f821310bcf6d7
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/47552ff4fd824caf38215468ebd2f31fb5f36d70
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/4c3fdcd316f780bab4ae5aa73c9626ea9fe24ac6
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/894c28afe3f2f8f31ff25b64191883517dddb5cf
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/cde7b7362adc15638c141c249681cbe5d23de663
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/dba9a7dc01e4dab14c77d328f6a6f46369aeee63
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/security/advisories/GHSA-h7r3-gmg9-xjmg
Source: security-advisories@github.com
Resource:
Third Party Advisory
Change History
0Changes found

Details not found