An issue was discovered on Espressif ESP32 3.0 (ESP32_rev300 ROM) devices. An EMFI attack on ECO3 provides the attacker with a capability to influence the PC value at the CPU context level, regardless of Secure Boot and Flash Encryption status. By using this capability, the attacker can exploit another behavior in the chip to gain unauthorized access to the ROM download mode. Access to ROM download mode may be further exploited to read the encrypted flash content in cleartext format or execute stub code.

Project Subscriptions

Vendors Products
Espressif Subscribe
Esp-eye Subscribe
Esp-eye Firmware Subscribe
Esp32-d0wd-v3 Subscribe
Esp32-d0wd-v3 Firmware Subscribe
Esp32-d0wdr2-v3 Subscribe
Esp32-d0wdr2-v3 Firmware Subscribe
Esp32-devkitc Subscribe
Esp32-devkitc Firmware Subscribe
Esp32-devkitm-1 Subscribe
Esp32-devkitm-1 Firmware Subscribe
Esp32-mini-1 Subscribe
Esp32-mini-1 Firmware Subscribe
Esp32-mini-1u Subscribe
Esp32-mini-1u Firmware Subscribe
Esp32-pico-d4 Subscribe
Esp32-pico-d4 Firmware Subscribe
Esp32-pico-kit Subscribe
Esp32-pico-kit Firmware Subscribe
Esp32-pico-mini-02 Subscribe
Esp32-pico-mini-02 Firmware Subscribe
Esp32-pico-mini-02u Subscribe
Esp32-pico-mini-02u Firmware Subscribe
Esp32-pico-v3 Subscribe
Esp32-pico-v3-02 Subscribe
Esp32-pico-v3-02 Firmware Subscribe
Esp32-pico-v3-zero Subscribe
Esp32-pico-v3-zero-devkit Subscribe
Esp32-pico-v3-zero-devkit Firmware Subscribe
Esp32-pico-v3-zero Firmware Subscribe
Esp32-pico-v3 Firmware Subscribe
Esp32-u4wdh Subscribe
Esp32-u4wdh Firmware Subscribe
Esp32-vaquita-dspg Subscribe
Esp32-vaquita-dspg Firmware Subscribe
Esp32-wroom-32e Subscribe
Esp32-wroom-32e Firmware Subscribe
Esp32-wroom-32ue Subscribe
Esp32-wroom-32ue Firmware Subscribe
Esp32-wroom-da Subscribe
Esp32-wroom-da Firmware Subscribe
Esp32-wrover-e Subscribe
Esp32-wrover-e Firmware Subscribe
Esp32-wrover-ie Subscribe
Esp32-wrover-ie Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-39813 An issue was discovered on Espressif ESP32 3.0 (ESP32_rev300 ROM) devices. An EMFI attack on ECO3 provides the attacker with a capability to influence the PC value at the CPU context level, regardless of Secure Boot and Flash Encryption status. By using this capability, the attacker can exploit another behavior in the chip to gain unauthorized access to the ROM download mode. Access to ROM download mode may be further exploited to read the encrypted flash content in cleartext format or execute stub code.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 31 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-31T15:25:01.252Z

Reserved: 2023-06-17T00:00:00

Link: CVE-2023-35818

cve-icon Vulnrichment

Updated: 2024-08-02T16:30:45.370Z

cve-icon NVD

Status : Modified

Published: 2023-07-17T16:15:09.940

Modified: 2024-11-21T08:08:45.653

Link: CVE-2023-35818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses