Discover the security vulnerability in Espressif ESP32 chip's bootloader allowing unauthorized access to sensitive data. Learn how to mitigate CVE-2019-17391.
A vulnerability has been found in the Espressif ESP32 mask ROM code versions from 2016-06-08 0 to 2, allowing an attacker with physical access to extract sensitive data stored in read-protected eFuses.
Understanding CVE-2019-17391
This CVE identifies a security issue in the ESP32 chip's initial bootloader that lacks sufficient measures to prevent glitches, enabling unauthorized access to sensitive information.
What is CVE-2019-17391?
The vulnerability in the ESP32 chip's mask ROM code allows attackers to extract flash encryption and secure boot keys by injecting a glitch into the chip's power supply after reset.
The Impact of CVE-2019-17391
The exploitation of this vulnerability could lead to unauthorized access to sensitive data stored in read-protected eFuses, compromising the security of the device and potentially exposing critical information.
Technical Details of CVE-2019-17391
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The lack of anti-glitch mitigations in the ESP32 chip's first-stage bootloader permits attackers with physical access to read the contents of read-protected eFuses, including flash encryption and secure boot keys.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2019-17391 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates