Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42483— ESP-NOW Replay Attacks Vulnerability

CVSS 6.5 · Medium EPSS 0.04% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-42483

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ESP-NOW Replay Attacks Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
在可信数据中接受外来的不可信数据
Source: NVD (National Vulnerability Database)
Vulnerability Title
ESP-NOW 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ESP-NOW是Espressif Systems开源的一个 Wi-Fi 通信协议。 ESP-NOW 2.5.1及之前版本存在安全漏洞,该漏洞源于缓存未对消息类型进行区分,导致重放攻击的风险。这可能会使攻击者清除缓存中的合法条目,从而创造重新注入先前捕获的数据包的机会。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
espressifesp-now < 2.5.2 -

II. Public POCs for CVE-2024-42483

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-42483

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-42483

No comments yet


Leave a comment