An issue was discovered on Espressif ESP32 3.0 (ESP32_rev300 ROM) devices. An EMFI attack on ECO3 provides the attacker with a capability to influence the PC value at the CPU context level, regardless of Secure Boot and Flash Encryption status. By using this capability, the attacker can exploit another behavior in the chip to gain unauthorized access to the ROM download mode. Access to ROM download mode may be further exploited to read the encrypted flash content in cleartext format or execute stub code.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Espressif
Subscribe
|
Esp-eye
Subscribe
Esp-eye Firmware
Subscribe
Esp32-d0wd-v3
Subscribe
Esp32-d0wd-v3 Firmware
Subscribe
Esp32-d0wdr2-v3
Subscribe
Esp32-d0wdr2-v3 Firmware
Subscribe
Esp32-devkitc
Subscribe
Esp32-devkitc Firmware
Subscribe
Esp32-devkitm-1
Subscribe
Esp32-devkitm-1 Firmware
Subscribe
Esp32-mini-1
Subscribe
Esp32-mini-1 Firmware
Subscribe
Esp32-mini-1u
Subscribe
Esp32-mini-1u Firmware
Subscribe
Esp32-pico-d4
Subscribe
Esp32-pico-d4 Firmware
Subscribe
Esp32-pico-kit
Subscribe
Esp32-pico-kit Firmware
Subscribe
Esp32-pico-mini-02
Subscribe
Esp32-pico-mini-02 Firmware
Subscribe
Esp32-pico-mini-02u
Subscribe
Esp32-pico-mini-02u Firmware
Subscribe
Esp32-pico-v3
Subscribe
Esp32-pico-v3-02
Subscribe
Esp32-pico-v3-02 Firmware
Subscribe
Esp32-pico-v3-zero
Subscribe
Esp32-pico-v3-zero-devkit
Subscribe
Esp32-pico-v3-zero-devkit Firmware
Subscribe
Esp32-pico-v3-zero Firmware
Subscribe
Esp32-pico-v3 Firmware
Subscribe
Esp32-u4wdh
Subscribe
Esp32-u4wdh Firmware
Subscribe
Esp32-vaquita-dspg
Subscribe
Esp32-vaquita-dspg Firmware
Subscribe
Esp32-wroom-32e
Subscribe
Esp32-wroom-32e Firmware
Subscribe
Esp32-wroom-32ue
Subscribe
Esp32-wroom-32ue Firmware
Subscribe
Esp32-wroom-da
Subscribe
Esp32-wroom-da Firmware
Subscribe
Esp32-wrover-e
Subscribe
Esp32-wrover-e Firmware
Subscribe
Esp32-wrover-ie
Subscribe
Esp32-wrover-ie Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-39813 | An issue was discovered on Espressif ESP32 3.0 (ESP32_rev300 ROM) devices. An EMFI attack on ECO3 provides the attacker with a capability to influence the PC value at the CPU context level, regardless of Secure Boot and Flash Encryption status. By using this capability, the attacker can exploit another behavior in the chip to gain unauthorized access to the ROM download mode. Access to ROM download mode may be further exploited to read the encrypted flash content in cleartext format or execute stub code. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 31 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-31T15:25:01.252Z
Reserved: 2023-06-17T00:00:00
Link: CVE-2023-35818
Updated: 2024-08-02T16:30:45.370Z
Status : Modified
Published: 2023-07-17T16:15:09.940
Modified: 2024-11-21T08:08:45.653
Link: CVE-2023-35818
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD