As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partition. Additionally, this allows the adversary to reflash the device with their own firmware which may contain malicious modifications.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1191 | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Espressif
Espressif esp32 |
|
| Vendors & Products |
Espressif
Espressif esp32 |
Wed, 10 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sensitive information such as details about the current and previous Wi-Fi network from the NVS partition. Additionally, this allows the adversary to reflash the device with their own firmware which may contain malicious modifications. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-10T00:00:00.000Z
Updated: 2025-12-11T20:36:05.419Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65821
Updated: 2025-12-11T20:20:24.441Z
Status : Received
Published: 2025-12-10T21:16:07.797
Modified: 2025-12-11T21:15:55.400
Link: CVE-2025-65821
No data.