Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68474: CWE-787: Out-of-bounds Write in espressif esp-idf

0
Medium
VulnerabilityCVE-2025-68474cvecve-2025-68474cwe-787
Published: Fri Dec 26 2025 (12/26/2025, 23:57:54 UTC)
Source: CVE Database V5
Vendor/Project: espressif
Product: esp-idf

Description

CVE-2025-68474 is a medium severity out-of-bounds write vulnerability in the Espressif ESP-IDF Bluetooth AVRCP stack affecting multiple versions up to 5. 5. 1. The flaw arises from improper buffer size validation in the avrc_vendor_msg() function, where the allocated buffer is smaller than the actual data written, leading to potential memory corruption. Exploitation requires network-level access to the Bluetooth interface but no authentication or user interaction. This vulnerability can cause crashes, undefined behavior, or potentially enable code execution depending on the context. No known exploits are currently reported in the wild. European organizations using IoT devices based on affected ESP-IDF versions, especially in industrial or consumer Bluetooth applications, may face risks. Mitigation involves updating to patched ESP-IDF versions once available and implementing strict input validation and memory safety checks. Countries with significant IoT manufacturing and deployment, such as Germany, France, and the UK, are most likely to be impacted due to market penetration and strategic use of Bluetooth-enabled devices.

AI-Powered Analysis

AILast updated: 12/27/2025, 00:24:25 UTC

Technical Analysis

CVE-2025-68474 is an out-of-bounds write vulnerability classified under CWE-787 found in the Espressif Internet of Things Development Framework (ESP-IDF), specifically within the BlueDroid AVRCP stack's avrc_vendor_msg() function. The vulnerability exists because the buffer size allocated for handling AVRCP vendor commands is validated against a constant AVRC_MIN_CMD_LEN (20 bytes), which is insufficient. The actual fixed header data written before the vendor payload is 29 bytes, exceeding the allocated buffer size. When the vendor_len parameter approaches the buffer limit, this discrepancy allows writes beyond the allocated memory boundary. This memory corruption can lead to crashes or undefined behavior, and the overflow risk increases when assertions are disabled in the build. The affected versions include ESP-IDF releases from 5.1.6 up to 5.5.1 and their beta variants. The vulnerability requires an attacker to send crafted AVRCP vendor commands over Bluetooth, which implies network-level access but no authentication or user interaction is necessary. The CVSS 4.0 score is 6.1 (medium), reflecting the moderate impact and attack complexity. No public exploits have been reported yet, but the flaw could be leveraged for denial of service or potentially arbitrary code execution in certain contexts. The lack of patches at the time of reporting necessitates cautious handling and monitoring for updates from Espressif.

Potential Impact

For European organizations, the impact of CVE-2025-68474 depends largely on their use of Espressif ESP-IDF-based devices, particularly those employing Bluetooth AVRCP profiles. Industries with widespread IoT deployments—such as manufacturing automation, smart building controls, automotive infotainment, and consumer electronics—may face risks of device instability or crashes due to memory corruption. This could disrupt operational continuity, degrade user experience, or open avenues for further exploitation if attackers achieve code execution. Given the medium severity and the need for network-level Bluetooth access, the threat is more pronounced in environments with exposed or poorly secured Bluetooth interfaces. Critical infrastructure relying on Bluetooth-enabled IoT devices could experience availability issues or require costly incident response. Additionally, the vulnerability could undermine trust in IoT deployments, impacting compliance with European cybersecurity regulations like NIS2. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as adversaries often target IoT ecosystems.

Mitigation Recommendations

European organizations should prioritize upgrading ESP-IDF to versions beyond 5.5.1 once Espressif releases patches addressing CVE-2025-68474. Until patches are available, implement strict network segmentation to isolate Bluetooth-enabled devices from untrusted networks and restrict Bluetooth access to authorized personnel and devices only. Employ Bluetooth security best practices such as disabling unused profiles, enforcing strong pairing mechanisms, and monitoring Bluetooth traffic for anomalous AVRCP commands. Conduct thorough firmware audits to identify devices running vulnerable ESP-IDF versions and plan for timely updates. Where feasible, apply runtime protections like stack canaries and address sanitizers during development to detect memory corruption. Additionally, collaborate with device manufacturers to ensure secure firmware supply chains and request vulnerability disclosures and patches. Maintain up-to-date asset inventories to track affected devices and incorporate this vulnerability into risk assessments and incident response plans. Finally, raise awareness among operational technology teams about the risks of Bluetooth vulnerabilities in IoT environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-18T13:52:15.491Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694f23b933784cecd4a2ce7e

Added to database: 12/27/2025, 12:09:29 AM

Last enriched: 12/27/2025, 12:24:25 AM

Last updated: 12/27/2025, 1:13:01 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats