Cyber Posture

CVE-2024-53406

HighPublic PoC

Published: 13 March 2025

Published
13 March 2025
Modified
31 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

Espressif ESP-IDF version 5.3.0 contains a vulnerability classified as CVE-2024-53406, stemming from insecure permissions (CWE-639) that enable authentication bypass. The issue arises during the reconnection phase of Bluetooth Low Energy (BLE) connections, where the device reuses the session key from a prior connection session. This flaw was published on 2025-03-13 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.

Attackers can exploit this vulnerability remotely over the network with low complexity and no required privileges, though user interaction is necessary. By leveraging the session key reuse, adversaries can bypass authentication mechanisms during reconnection, executing security bypass attacks that grant unauthorized access to the affected device.

References include the official Espressif ESP-IDF GitHub repository at https://github.com/espressif/esp-idf and a proof-of-concept demonstrating session key reuse at https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md, though specific mitigation or patch details are not detailed in available information.

Details

CWE(s)
CWE-639

Affected Products

espressif
esp-idf
5.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The auth bypass via BLE session key reuse enables remote exploitation of the vulnerable component for unauthorized access, mapping to exploitation of public-facing applications.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References