Replies: 4 comments 23 replies
-
Espressif released an update to ESP-IDF which includes patches for the FragAttacks CVEs. See their Security Advisory.
At the moment, Arduino core 1.0.6 still uses ESP-IDF 3.3.5. We will update it as soon as a new core become available. |
Beta Was this translation helpful? Give feedback.
-
Additionally we should consider configuration options to disable telnet/http (only MQTT-operation). Also implement some extra security like encryption for MQTT client like SSL/TLS as HA already supports it. |
Beta Was this translation helpful? Give feedback.
-
Not FragAttacks, but still interesting read: |
Beta Was this translation helpful? Give feedback.
-
FragAttack has been fixed in arduino-esp32 v2.0.0 Now the platformio framework needs to update too, so we can use it. |
Beta Was this translation helpful? Give feedback.
-
@fvanroie please have a look at the latest Wifi vulnerabilities discussion on Tasmota:
arendst/Tasmota#12104
How deep should we be concerned?
Eg. I'm thinking of this:
How can the adversary construct unencrypted Wi-Fi frames so they are accepted by a vulnerable device? First, certain Wi-Fi devices accept any unencrypted frame even when connected to a protected Wi-Fi network. This means the attacker doesn't have to do anything special! Two of out of four tested home routers were affected by this vulnerability, several internet-of-things devices were affected, and some smartphones were affected.
Beta Was this translation helpful? Give feedback.
All reactions