2024-12-08 03:06:42 +00:00

119 lines
4.1 KiB
JSON

{
"id": "CVE-2024-42483",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-12T15:18:22.093",
"lastModified": "2024-09-23T14:06:04.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2."
},
{
"lang": "es",
"value": "El componente ESP-NOW proporciona un protocolo de comunicaci\u00f3n Wi-Fi sin conexi\u00f3n. Se descubri\u00f3 una vulnerabilidad de ataques de repetici\u00f3n en la implementaci\u00f3n de ESP-NOW porque las cach\u00e9s no se diferencian por tipos de mensajes, son un \u00fanico recurso compartido para todo tipo de mensajes, ya sean de difusi\u00f3n o unidifusi\u00f3n, y sin importar si son texto cifrado o texto plano. Esto puede provocar que un atacante borre la cach\u00e9 de sus entradas leg\u00edtimas, creando as\u00ed una oportunidad para volver a inyectar paquetes capturados previamente. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 2.5.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-349"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:espressif:esp-now:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.2",
"matchCriteriaId": "3C392E00-5DEB-4D98-9897-D1AD741E6FA1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef",
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}