The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload.
References
Link | Resource |
---|---|
https://github.com/espressif/esp32-bt-lib | Product Third Party Advisory |
https://dl.packetstormsecurity.net/papers/general/braktooth.pdf | Technical Description Third Party Advisory |
https://www.espressif.com/en/products/socs/esp32 | Product Vendor Advisory |
https://github.com/espressif/esp-idf | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-09-07 00:15
Updated : 2021-09-09 16:30
NVD link : CVE-2021-28139
Mitre link : CVE-2021-28139
JSON object : View
CWE
Products Affected
espressif
- esp32
- esp-idf