CVE-2021-28139

The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload.
References
Link Resource
https://github.com/espressif/esp32-bt-lib Product Third Party Advisory
https://dl.packetstormsecurity.net/papers/general/braktooth.pdf Technical Description Third Party Advisory
https://www.espressif.com/en/products/socs/esp32 Product Vendor Advisory
https://github.com/espressif/esp-idf Product Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*
cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*

Information

Published : 2021-09-07 00:15

Updated : 2021-09-09 16:30


NVD link : CVE-2021-28139

Mitre link : CVE-2021-28139


JSON object : View

Advertisement

dedicated server usa

Products Affected

espressif

  • esp32
  • esp-idf