Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B9C04BA-1FC0-49A5-B89F-16014DA3D48B", "versionEndExcluding": "3.0.9", "versionStartIncluding": "3.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*", "matchCriteriaId": "73B68B98-07BA-468B-B11B-0A76527F7419", "versionEndExcluding": "3.1.6", "versionStartExcluding": "3.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*", "matchCriteriaId": "21A89350-58F6-4746-906C-54B36814AAB9", "versionEndExcluding": "3.2.3", "versionStartExcluding": "3.2", "vulnerable": true}, {"criteria": "cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*", "matchCriteriaId": "29E03576-DD87-4AB7-9291-E23972A9C9E6", "versionEndExcluding": "3.3.1", "versionStartIncluding": "3.3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.6, 3.2.x through 3.2.3, and 3.3.x through 3.3.1. An attacker who uses fault injection to physically disrupt the ESP32 CPU can bypass the Secure Boot digest verification at startup, and boot unverified code from flash. The fault injection attack does not disable the Flash Encryption feature, so if the ESP32 is configured with the recommended combination of Secure Boot and Flash Encryption, then the impact is minimized. If the ESP32 is configured without Flash Encryption then successful fault injection allows arbitrary code execution. To protect devices with Flash Encryption and Secure Boot enabled against this attack, a firmware change must be made to permanently enable Flash Encryption in the field if it is not already permanently enabled."}, {"lang": "es", "value": "Se detect\u00f3 un problema en Espressif ESP-IDF versiones 2.x, versiones 3.0.x hasta 3.0.9, versiones 3.1.x hasta 3.1.6, versiones 3.2.x hasta 3.2.3 y versiones 3.3.x hasta 3.3.1. Un atacante que utiliza la inyecci\u00f3n de un fallo para interrumpir f\u00edsicamente la CPU ESP32 puede omitir la comprobaci\u00f3n del resumen de Secure Boot en el inicio y arrancar el c\u00f3digo no comprobado desde la memoria flash. El ataque de inyecci\u00f3n de fallo no deshabilita la funci\u00f3n de cifrado de la Flash, por lo que si la ESP32 est\u00e1 configurada con la combinaci\u00f3n recomendada de Secure Boot y Flash Encryption, entonces el impacto es minimizado. Si el ESP32 est\u00e1 configurado sin Flash Encryption, entonces la inyecci\u00f3n de fallo con \u00e9xito permite la ejecuci\u00f3n de c\u00f3digo arbitrario. Para proteger los dispositivos con Flash Encryption y Secure Boot habilitados contra este ataque, un cambio de firmware se debe realizar para habilitar permanentemente la Flash Encryption en el campo si a\u00fan no est\u00e1 habilitado permanentemente."}], "id": "CVE-2019-15894", "lastModified": "2024-11-21T04:29:40.990", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-10-07T16:15:11.413", "references": [{"source": "cve@mitre.org", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://www.espressif.com/en/news/Espressif_Security_Advisory_Concerning_Fault_Injection_and_Secure_Boot"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Vendor Advisory"], "url": "https://www.espressif.com/en/news/Espressif_Security_Advisory_Concerning_Fault_Injection_and_Secure_Boot"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-755"}], "source": "nvd@nist.gov", "type": "Primary"}]}