Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64342: CWE-754: Improper Check for Unusual or Exceptional Conditions in espressif esp-idf

0
Medium
VulnerabilityCVE-2025-64342cvecve-2025-64342cwe-754
Published: Mon Nov 17 2025 (11/17/2025, 17:21:01 UTC)
Source: CVE Database V5
Vendor/Project: espressif
Product: esp-idf

Description

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. When the ESP32 is in advertising mode, if it receives a connection request containing an invalid Access Address (AA) of 0x00000000 or 0xFFFFFFFF, advertising may stop unexpectedly. In this case, the controller may incorrectly report a connection event to the host, which can cause the application layer to assume that the device has successfully established a connection. This issue has been fixed in versions 5.5.2, 5.4.3, 5.3.5, 5.2.6, and 5.1.7. At time of publication versions 5.5.2, 5.3.5, and 5.1.7 have not been released but are fixed respectively in commits 3b95b50, e3d7042, and 75967b5.

AI-Powered Analysis

AILast updated: 11/17/2025, 17:41:05 UTC

Technical Analysis

The vulnerability identified as CVE-2025-64342 resides in the Espressif Internet of Things Development Framework (esp-idf), specifically impacting the ESP32 microcontroller's Bluetooth advertising mode. The flaw arises when the ESP32 receives a Bluetooth connection request containing an invalid Access Address (AA) set to either 0x00000000 or 0xFFFFFFFF. Under normal operation, the Access Address is a unique 32-bit value used to identify a Bluetooth connection. However, the esp-idf fails to properly check for these unusual or exceptional AA values, which are invalid in the Bluetooth specification. When such a malformed request is received, the ESP32's advertising process may halt unexpectedly. Moreover, the controller erroneously signals a connection event to the host system, misleading the application layer into believing a connection has been successfully established. This improper check for exceptional conditions corresponds to CWE-754. The consequence is a disruption in Bluetooth advertising, which can degrade device availability and potentially cause application logic errors due to false connection states. The vulnerability affects multiple esp-idf versions starting from beta releases up to versions before the fixed releases 5.5.2, 5.4.3, 5.3.5, 5.2.6, and 5.1.7. The issue does not require any privileges, authentication, or user interaction to exploit, and no known exploits have been reported in the wild as of publication. The CVSS 4.0 base score is 6.9, reflecting a medium severity with network attack vector, low attack complexity, and no privileges or user interaction required. The root cause is an improper validation of Bluetooth connection requests, leading to unexpected device behavior and potential denial of service conditions.

Potential Impact

For European organizations deploying ESP32-based IoT devices, this vulnerability can lead to unexpected disruptions in Bluetooth advertising functionality, which is critical for device discoverability and connectivity. The false reporting of connection events may cause applications to mismanage connection states, potentially leading to logic errors, degraded device performance, or denial of service scenarios. In industrial, healthcare, smart city, or consumer IoT deployments, such disruptions could impair operational continuity, data collection, or user experience. While no direct data confidentiality or integrity compromise is indicated, the availability impact and application misbehavior could indirectly affect system reliability and trustworthiness. Organizations relying on Bluetooth connectivity for critical functions should consider this a moderate risk, especially where ESP32 devices are widely used. The lack of known exploits reduces immediate threat but does not eliminate risk, as attackers could craft malformed Bluetooth packets to trigger the issue. Given the widespread adoption of ESP32 in European IoT ecosystems, the impact could be significant if unpatched devices are targeted.

Mitigation Recommendations

European organizations should promptly identify all ESP32 devices running vulnerable esp-idf versions and apply the patches provided in esp-idf releases 5.5.2, 5.4.3, 5.3.5, 5.2.6, or 5.1.7 as appropriate. Where immediate patching is not feasible, network-level controls can be implemented to monitor and filter Bluetooth traffic for malformed connection requests with invalid Access Addresses (0x00000000 or 0xFFFFFFFF). Device firmware should be updated to include robust validation of Bluetooth connection parameters to prevent advertising disruptions. Additionally, application logic should be hardened to verify connection states independently rather than relying solely on controller-reported events. Organizations should also conduct thorough testing of Bluetooth functionality post-update to ensure stability. Incorporating anomaly detection for unusual Bluetooth traffic patterns can provide early warning of exploitation attempts. Finally, maintain awareness of vendor advisories and monitor for any emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.031Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b5ce0c08982598af0784c

Added to database: 11/17/2025, 5:35:28 PM

Last enriched: 11/17/2025, 5:41:05 PM

Last updated: 11/22/2025, 12:35:37 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats