CVE-2024-53406
Published: 13 March 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
Espressif ESP-IDF version 5.3.0 contains a vulnerability classified as CVE-2024-53406, stemming from insecure permissions (CWE-639) that enable authentication bypass. The issue arises during the reconnection phase of Bluetooth Low Energy (BLE) connections, where the device reuses the session key from a prior connection session. This flaw was published on 2025-03-13 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.
Attackers can exploit this vulnerability remotely over the network with low complexity and no required privileges, though user interaction is necessary. By leveraging the session key reuse, adversaries can bypass authentication mechanisms during reconnection, executing security bypass attacks that grant unauthorized access to the affected device.
References include the official Espressif ESP-IDF GitHub repository at https://github.com/espressif/esp-idf and a proof-of-concept demonstrating session key reuse at https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md, though specific mitigation or patch details are not detailed in available information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The auth bypass via BLE session key reuse enables remote exploitation of the vulnerable component for unauthorized access, mapping to exploitation of public-facing applications.