Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-25508
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-04 Feb, 2026 | 18:16
Updated At-20 Feb, 2026 | 17:13

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, an out-of-bounds read vulnerability was reported in the BLE ATT Prepare Write handling of the BLE provisioning transport (protocomm_ble). The issue can be triggered by a remote BLE client while the device is in provisioning mode. The transport accumulated prepared-write fragments in a fixed-size buffer but incorrectly tracked the cumulative length. By sending repeated prepare write requests with overlapping offsets, a remote client could cause the reported length to exceed the allocated buffer size. This inflated length was then passed to provisioning handlers during execute-write processing, resulting in an out-of-bounds read and potential memory corruption. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Primary3.16.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Type: Secondary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Type: Primary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CPE Matches

espressif
espressif
>>esp-idf>>5.1.6
cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.2.6
cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.3.4
cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.4.3
cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.5.2
cpe:2.3:a:espressif:esp-idf:5.5.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarysecurity-advisories@github.com
CWE ID: CWE-125
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/espressif/esp-idf/commit/0540c85140c2c06c0cbecc8843277ea676d5c4a9security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/1ff264abf2504cade46f0ce3a03f821310bcf6d7security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/47552ff4fd824caf38215468ebd2f31fb5f36d70security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/4c3fdcd316f780bab4ae5aa73c9626ea9fe24ac6security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/894c28afe3f2f8f31ff25b64191883517dddb5cfsecurity-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/cde7b7362adc15638c141c249681cbe5d23de663security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/dba9a7dc01e4dab14c77d328f6a6f46369aeee63security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/security/advisories/GHSA-9j5x-rf36-54x9security-advisories@github.com
Third Party Advisory
Hyperlink: https://github.com/espressif/esp-idf/commit/0540c85140c2c06c0cbecc8843277ea676d5c4a9
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/1ff264abf2504cade46f0ce3a03f821310bcf6d7
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/47552ff4fd824caf38215468ebd2f31fb5f36d70
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/4c3fdcd316f780bab4ae5aa73c9626ea9fe24ac6
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/894c28afe3f2f8f31ff25b64191883517dddb5cf
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/cde7b7362adc15638c141c249681cbe5d23de663
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/dba9a7dc01e4dab14c77d328f6a6f46369aeee63
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/security/advisories/GHSA-9j5x-rf36-54x9
Source: security-advisories@github.com
Resource:
Third Party Advisory
Change History
0Changes found

Details not found