The ESP32 system on a chip (SoC) that powers the Meatmeet basestation device was found to lack Secure Boot. The Secure Boot feature ensures that only authenticated software can execute on the device. The Secure Boot process forms a chain of trust by verifying all mutable software entities involved in the Application Startup Flow. As a result, an attacker with physical access to the device can flash modified firmware to the device, resulting in the execution of malicious code upon startup.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Espressif
Espressif esp32 |
|
| Vendors & Products |
Espressif
Espressif esp32 |
Wed, 10 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The ESP32 system on a chip (SoC) that powers the Meatmeet basestation device was found to lack Secure Boot. The Secure Boot feature ensures that only authenticated software can execute on the device. The Secure Boot process forms a chain of trust by verifying all mutable software entities involved in the Application Startup Flow. As a result, an attacker with physical access to the device can flash modified firmware to the device, resulting in the execution of malicious code upon startup. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-12-10T00:00:00.000Z
Updated: 2025-12-11T20:09:25.004Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65829
Updated: 2025-12-11T20:08:52.463Z
Status : Received
Published: 2025-12-10T21:16:08.690
Modified: 2025-12-11T20:16:29.183
Link: CVE-2025-65829
No data.