CVE-2019-12587

Published Sep 4, 2019

Last updated 4 years ago

Overview

Description
The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames via a rogue access point.
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.0

Type
Primary
Base score
8.1
Impact score
5.2
Exploitability score
2.8
Vector string
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
4.8
Impact score
4.9
Exploitability score
6.5
Vector string
AV:A/AC:L/Au:N/C:P/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-327

Social media

Hype score
Not currently trending

Configurations