CVE-2019-12587
Severity CVSS v4.0:
Pending analysis
Type:
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Publication date:
04/09/2019
Last modified:
24/08/2020
Description
The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames via a rogue access point.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
4.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:* | 2.0.0 (including) | 4.0.0 (including) |
cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:* | 2.2.0 (including) | 3.1.0 (including) |
To consult the complete list of CPE names with products and versions, see this page