CVE-2026-25508: CWE-125: Out-of-bounds Read in espressif esp-idf
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, an out-of-bounds read vulnerability was reported in the BLE ATT Prepare Write handling of the BLE provisioning transport (protocomm_ble). The issue can be triggered by a remote BLE client while the device is in provisioning mode. The transport accumulated prepared-write fragments in a fixed-size buffer but incorrectly tracked the cumulative length. By sending repeated prepare write requests with overlapping offsets, a remote client could cause the reported length to exceed the allocated buffer size. This inflated length was then passed to provisioning handlers during execute-write processing, resulting in an out-of-bounds read and potential memory corruption. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
AI Analysis
Technical Summary
The vulnerability CVE-2026-25508 affects the Espressif Internet of Things Development Framework (esp-idf), specifically versions 5.1.6, 5.2.6, 5.3.4, 5.4.3, and 5.5.2. It arises from an out-of-bounds read condition in the Bluetooth Low Energy (BLE) Attribute Protocol (ATT) Prepare Write handling within the BLE provisioning transport component (protocomm_ble). During provisioning mode, the device accumulates prepared-write fragments in a fixed-size buffer but incorrectly tracks the cumulative length of these fragments. A remote BLE client can exploit this by sending multiple prepare write requests with overlapping offsets, causing the reported cumulative length to exceed the allocated buffer size. This inflated length is then used during the execute-write phase, leading to an out-of-bounds read and potential memory corruption. This can destabilize the device or cause unexpected behavior, potentially impacting device availability and integrity. The vulnerability does not require prior authentication but does require the device to be in provisioning mode, which typically involves user interaction. Espressif has addressed this issue in versions 5.1.7, 5.2.7, 5.3.5, 5.4.4, and 5.5.3. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with attack vector being adjacent network (BLE), low attack complexity, no privileges required, and user interaction needed.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns IoT devices built on Espressif's esp-idf framework that utilize BLE provisioning. Exploitation could lead to memory corruption, causing device crashes or erratic behavior, which may disrupt critical IoT services or industrial control systems relying on these devices. While confidentiality is not directly compromised, the integrity and availability of devices can be affected, potentially leading to denial of service or operational interruptions. This is particularly significant for sectors with high IoT adoption such as manufacturing, smart cities, healthcare, and utilities. Disruptions in these sectors could have cascading effects on operational efficiency and safety. Since exploitation requires physical proximity to the BLE interface and user interaction to enable provisioning mode, the risk is somewhat mitigated but still relevant in environments where devices are accessible to untrusted individuals. Failure to patch could expose organizations to targeted attacks or accidental disruptions during device provisioning or maintenance.
Mitigation Recommendations
European organizations should immediately audit their IoT device inventory to identify products using affected esp-idf versions (5.1.6, 5.2.6, 5.3.4, 5.4.3, 5.5.2). They must prioritize updating these devices to patched esp-idf versions (5.1.7, 5.2.7, 5.3.5, 5.4.4, 5.5.3) provided by Espressif. Where firmware updates are not immediately feasible, organizations should restrict physical access to BLE interfaces, especially during provisioning phases, and disable BLE provisioning if not required. Implement network segmentation and monitoring for unusual BLE activity to detect potential exploitation attempts. Device manufacturers and integrators should review provisioning workflows to minimize exposure time and consider additional authentication or authorization mechanisms during provisioning. Regular vulnerability scanning and penetration testing focusing on BLE interfaces can help identify residual risks. Finally, maintain awareness of vendor advisories for any emerging exploits or patches related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2026-25508: CWE-125: Out-of-bounds Read in espressif esp-idf
Description
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, an out-of-bounds read vulnerability was reported in the BLE ATT Prepare Write handling of the BLE provisioning transport (protocomm_ble). The issue can be triggered by a remote BLE client while the device is in provisioning mode. The transport accumulated prepared-write fragments in a fixed-size buffer but incorrectly tracked the cumulative length. By sending repeated prepare write requests with overlapping offsets, a remote client could cause the reported length to exceed the allocated buffer size. This inflated length was then passed to provisioning handlers during execute-write processing, resulting in an out-of-bounds read and potential memory corruption. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-25508 affects the Espressif Internet of Things Development Framework (esp-idf), specifically versions 5.1.6, 5.2.6, 5.3.4, 5.4.3, and 5.5.2. It arises from an out-of-bounds read condition in the Bluetooth Low Energy (BLE) Attribute Protocol (ATT) Prepare Write handling within the BLE provisioning transport component (protocomm_ble). During provisioning mode, the device accumulates prepared-write fragments in a fixed-size buffer but incorrectly tracks the cumulative length of these fragments. A remote BLE client can exploit this by sending multiple prepare write requests with overlapping offsets, causing the reported cumulative length to exceed the allocated buffer size. This inflated length is then used during the execute-write phase, leading to an out-of-bounds read and potential memory corruption. This can destabilize the device or cause unexpected behavior, potentially impacting device availability and integrity. The vulnerability does not require prior authentication but does require the device to be in provisioning mode, which typically involves user interaction. Espressif has addressed this issue in versions 5.1.7, 5.2.7, 5.3.5, 5.4.4, and 5.5.3. No known exploits are currently reported in the wild. The CVSS v3.1 base score is 6.3, indicating a medium severity level, with attack vector being adjacent network (BLE), low attack complexity, no privileges required, and user interaction needed.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns IoT devices built on Espressif's esp-idf framework that utilize BLE provisioning. Exploitation could lead to memory corruption, causing device crashes or erratic behavior, which may disrupt critical IoT services or industrial control systems relying on these devices. While confidentiality is not directly compromised, the integrity and availability of devices can be affected, potentially leading to denial of service or operational interruptions. This is particularly significant for sectors with high IoT adoption such as manufacturing, smart cities, healthcare, and utilities. Disruptions in these sectors could have cascading effects on operational efficiency and safety. Since exploitation requires physical proximity to the BLE interface and user interaction to enable provisioning mode, the risk is somewhat mitigated but still relevant in environments where devices are accessible to untrusted individuals. Failure to patch could expose organizations to targeted attacks or accidental disruptions during device provisioning or maintenance.
Mitigation Recommendations
European organizations should immediately audit their IoT device inventory to identify products using affected esp-idf versions (5.1.6, 5.2.6, 5.3.4, 5.4.3, 5.5.2). They must prioritize updating these devices to patched esp-idf versions (5.1.7, 5.2.7, 5.3.5, 5.4.4, 5.5.3) provided by Espressif. Where firmware updates are not immediately feasible, organizations should restrict physical access to BLE interfaces, especially during provisioning phases, and disable BLE provisioning if not required. Implement network segmentation and monitoring for unusual BLE activity to detect potential exploitation attempts. Device manufacturers and integrators should review provisioning workflows to minimize exposure time and consider additional authentication or authorization mechanisms during provisioning. Regular vulnerability scanning and penetration testing focusing on BLE interfaces can help identify residual risks. Finally, maintain awareness of vendor advisories for any emerging exploits or patches related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T18:21:42.486Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69838cacf9fa50a62fa09397
Added to database: 2/4/2026, 6:15:08 PM
Last enriched: 2/4/2026, 6:29:58 PM
Last updated: 2/6/2026, 11:44:51 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.