CVE-2025-65821
BaseFortify
Publication date: 2025-12-10
Last updated on: 2025-12-12
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| espressif | esp32 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1191 | The chip does not implement or does not correctly perform access control to check whether users are authorized to access internal registers and test modes through the physical debug/test interface. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs because the UART download mode is still enabled on the ESP32 chip running the firmware. This allows an attacker to dump the device's flash memory and retrieve sensitive information, such as details about current and previous Wi-Fi networks stored in the NVS partition. Furthermore, the attacker can reflash the device with malicious firmware.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to sensitive information stored on the device, including Wi-Fi network details. It also allows an attacker to install malicious firmware on the device, potentially compromising its functionality and security.