Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25508: CWE-125: Out-of-bounds Read in espressif esp-idf

0
Medium
VulnerabilityCVE-2026-25508cvecve-2026-25508cwe-125
Published: Wed Feb 04 2026 (02/04/2026, 17:58:28 UTC)
Source: CVE Database V5
Vendor/Project: espressif
Product: esp-idf

Description

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, an out-of-bounds read vulnerability was reported in the BLE ATT Prepare Write handling of the BLE provisioning transport (protocomm_ble). The issue can be triggered by a remote BLE client while the device is in provisioning mode. The transport accumulated prepared-write fragments in a fixed-size buffer but incorrectly tracked the cumulative length. By sending repeated prepare write requests with overlapping offsets, a remote client could cause the reported length to exceed the allocated buffer size. This inflated length was then passed to provisioning handlers during execute-write processing, resulting in an out-of-bounds read and potential memory corruption. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.

AI-Powered Analysis

AILast updated: 02/04/2026, 18:29:58 UTC

Technical Analysis

The vulnerability CVE-2026-25508 affects the Espressif Internet of Things Development Framework (esp-idf), specifically versions 5.1.6, 5.2.6, 5.3.4, 5.4.3, and 5.5.2. It arises from an out-of-bounds read condition in the Bluetooth Low Energy (BLE) Attribute Protocol (ATT) Prepare Write handling within the BLE provisioning transport component (protocomm_ble). During provisioning mode, the device accumulates prepared-write fragments in a fixed-size buffer but incorrectly tracks the cumulative length of these fragments. A remote BLE client can exploit this by sending multiple prepare write requests with overlapping offsets, causing the reported cumulative length to exceed the allocated buffer size. This inflated length is then used during the execute-write phase, leading to an out-of-bounds read and potential memory corruption. This can destabilize the device or cause unexpected behavior, potentially impacting device availability and integrity. The vulnerability does not require prior authentication but does require the device to be in provisioning mode, which typically involves user interaction. Espressif has addressed this issue in versions 5.1.7, 5.2.7, 5.3.5, 5.4.4, and 5.5.3. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with attack vector being adjacent network (BLE), low attack complexity, no privileges required, and user interaction needed.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns IoT devices built on Espressif's esp-idf framework that utilize BLE provisioning. Exploitation could lead to memory corruption, causing device crashes or erratic behavior, which may disrupt critical IoT services or industrial control systems relying on these devices. While confidentiality is not directly compromised, the integrity and availability of devices can be affected, potentially leading to denial of service or operational interruptions. This is particularly significant for sectors with high IoT adoption such as manufacturing, smart cities, healthcare, and utilities. Disruptions in these sectors could have cascading effects on operational efficiency and safety. Since exploitation requires physical proximity to the BLE interface and user interaction to enable provisioning mode, the risk is somewhat mitigated but still relevant in environments where devices are accessible to untrusted individuals. Failure to patch could expose organizations to targeted attacks or accidental disruptions during device provisioning or maintenance.

Mitigation Recommendations

European organizations should immediately audit their IoT device inventory to identify products using affected esp-idf versions (5.1.6, 5.2.6, 5.3.4, 5.4.3, 5.5.2). They must prioritize updating these devices to patched esp-idf versions (5.1.7, 5.2.7, 5.3.5, 5.4.4, 5.5.3) provided by Espressif. Where firmware updates are not immediately feasible, organizations should restrict physical access to BLE interfaces, especially during provisioning phases, and disable BLE provisioning if not required. Implement network segmentation and monitoring for unusual BLE activity to detect potential exploitation attempts. Device manufacturers and integrators should review provisioning workflows to minimize exposure time and consider additional authentication or authorization mechanisms during provisioning. Regular vulnerability scanning and penetration testing focusing on BLE interfaces can help identify residual risks. Finally, maintain awareness of vendor advisories for any emerging exploits or patches related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.486Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69838cacf9fa50a62fa09397

Added to database: 2/4/2026, 6:15:08 PM

Last enriched: 2/4/2026, 6:29:58 PM

Last updated: 2/6/2026, 11:44:51 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats