{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T19:58:12.030","vulnerabilities":[{"cve":{"id":"CVE-2022-24893","sourceIdentifier":"security-advisories@github.com","published":"2022-06-25T07:15:07.147","lastModified":"2024-11-21T06:51:20.367","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware."},{"lang":"es","value":"ESP-IDF es el marco de desarrollo oficial de los SoC de Espressif. En el SDK de malla Bluetooth de Espressif (\"ESP-BLE-MESH\"), puede desencadenarse una vulnerabilidad de corrupción de memoria durante el aprovisionamiento, debido a que no es comprobado el campo \"SegN\" de la PDU de inicio de transacción. Esto puede resultar en ataques relacionados con la corrupción de la memoria y, potencialmente, a que un atacante obtenga el control de todo el sistema. Los parches están disponibles en las ramas 4.1, 4.2, 4.3 y 4.4 y es recomendado a usuarios actualizar. La actualización es aplicable a todas las aplicaciones y usuarios del componente \"ESP-BLE-MESH\" de \"ESP-IDF\". Como es implementado en la pila de Bluetooth Mesh, no se presenta ninguna mitigación para que el usuario arregle la capa de la aplicación sin actualizar el firmware subyacente"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","baseScore":8.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":6.5,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-787"},{"lang":"en","value":"CWE-788"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:espressif:esp-idf:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"0F47D8F2-D988-4FB8-A207-1FC50A847A05"},{"vulnerable":true,"criteria":"cpe:2.3:a:espressif:esp-idf:4.2.3:*:*:*:*:*:*:*","matchCriteriaId":"2A623086-6DB4-485C-9CCE-C67357E84258"},{"vulnerable":true,"criteria":"cpe:2.3:a:espressif:esp-idf:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"E9AB5D52-4B51-4436-BAD4-82906CD7F9CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:espressif:esp-idf:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"2E24FD68-7908-4C0F-BD6B-8641992870F5"}]}]}],"references":[{"url":"https://github.com/espressif/esp-idf/security/advisories/GHSA-7f7f-jj2q-28wm","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/espressif/esp-idf/security/advisories/GHSA-7f7f-jj2q-28wm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}