CVE-2020-12638
Summary
| CVE | CVE-2020-12638 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-23 16:15:00 UTC |
| Updated | 2021-07-21 11:39:00 UTC |
| Description | An encryption-bypass issue was discovered on Espressif ESP-IDF devices through 4.2, ESP8266_NONOS_SDK devices through 3.0.3, and ESP8266_RTOS_SDK devices through 3.3. Broadcasting forged beacon frames forces a device to change its authentication mode to OPEN, effectively disabling its 802.11 encryption. |
Risk And Classification
Problem Types: CWE-287 | CWE-319
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Espressif | Esp-idf | All | All | All | All |
| Application | Espressif | Esp8266 Nonos Sdk | All | All | All | All |
| Application | Espressif | Esp8266 Rtos Sdk | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| espressif/ESP8266_RTOS_SDK · GitHub | MISC | github.com | Third Party Advisory |
| LBSFilm | WPA2 Authenticationmode downgrade in Espressif microprocessors (CVE-2020-12638) | MISC | lbsfilm.at | Exploit, Patch, Third Party Advisory |
| GitHub - espressif/esp-idf: Espressif IoT Development Framework. Official development framework for ESP32. | MISC | github.com | Third Party Advisory |
| GitHub - espressif/ESP8266_NONOS_SDK: ESP8266 nonOS SDK | MISC | github.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.