CVE-2019-12588
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
04/09/2019
Last modified:
09/09/2019
Description
The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:espressif:arduino_esp8266:*:*:*:*:*:*:*:* | 2.5.2 (including) | |
cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:* | 2.2.0 (including) | 3.1.0 (including) |
To consult the complete list of CPE names with products and versions, see this page