CVE-2023-35818
moderate-risk
Published 2023-07-17
An issue was discovered on Espressif ESP32 3.0 (ESP32_rev300 ROM) devices. An EMFI attack on ECO3 provides the attacker with a capability to influence the PC value at the CPU context level, regardless of Secure Boot and Flash Encryption status. By using this capability, the attacker can exploit another behavior in the chip to gain unauthorized access to the ROM download mode. Access to ROM download mode may be further exploited to read the encrypted flash content in cleartext format or execute stub code.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.8/10
Medium
PHYSICAL
/ LOW complexity
Affected Products (20)
Esp32-D0Wd-V3 Firmware
Esp32-D0Wd-V3 Firmware
Esp32-D0Wdr2-V3 Firmware
Esp32-D0Wdr2-V3 Firmware
Esp32-U4Wdh Firmware
Esp32-U4Wdh Firmware
Esp32-Pico-V3 Firmware
Esp32-Pico-V3 Firmware
Esp32-Pico-V3-02 Firmware
Esp32-Pico-V3-02 Firmware
Esp32-Pico-D4 Firmware
Esp32-Pico-D4 Firmware
Esp32-Wroom-32E Firmware
Esp32-Wroom-32E Firmware
Esp32-Wroom-32Ue Firmware
Esp32-Wroom-32Ue Firmware
Esp32-Wroom-Da Firmware
Esp32-Wroom-Da Firmware
Esp32-Wrover-E Firmware
Esp32-Wrover-E Firmware
Affected Vendors
References (4)
47
/ 100
moderate-risk
Severity
22/34 · High
Exploitability
0/34 · Minimal
Exposure
25/34 · High