An encryption-bypass issue was discovered on Espressif ESP-IDF devices through 4.2, ESP8266_NONOS_SDK devices through 3.0.3, and ESP8266_RTOS_SDK devices through 3.3. Broadcasting forged beacon frames forces a device to change its authentication mode to OPEN, effectively disabling its 802.11 encryption.
References
Link | Resource |
---|---|
https://github.com/espressif/ESP8266_NONOS_SDK | Third Party Advisory |
https://github.com/espressif/ESP8266_RTOS_SDK | Third Party Advisory |
https://github.com/espressif/esp-idf | Third Party Advisory |
https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-07-23T15:41:58
Updated: 2020-07-23T15:41:58
Reserved: 2020-05-04T00:00:00
Link: CVE-2020-12638
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-23T16:15:12.490
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-12638
JSON object: View
Redhat Information
No data.