The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames via a rogue access point.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://github.com/espressif | product |
https://github.com/Matheus-Garbelini/esp32_esp8266_attacks | third party advisory exploit |
https://matheus-garbelini.github.io/home/post/zero-pmk-installation/ | third party advisory patch |