CVE-2024-53406
Published: 13 March 2025
Summary
CVE-2024-53406 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Espressif Esp-Idf. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 IA-11 (Re-authentication) and SC-12 (Cryptographic Key Establishment and Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires re-authentication upon reconnection, directly preventing authentication bypass via reuse of previous session keys.
Mandates proper cryptographic key establishment and management to avoid inappropriate reuse of session keys across BLE connections.
Protects communications session authenticity against exploitation of session key reuse for impersonation and bypass attacks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The auth bypass via BLE session key reuse enables remote exploitation of the vulnerable component for unauthorized access, mapping to exploitation of public-facing applications.
NVD Description
Espressif Esp idf v5.3.0 is vulnerable to Insecure Permissions resulting in Authentication bypass. In the reconnection phase, the device reuses the session key from a previous connection session, creating an opportunity for attackers to execute security bypass attacks.
Deeper analysisAI
Espressif ESP-IDF version 5.3.0 contains a vulnerability classified as CVE-2024-53406, stemming from insecure permissions (CWE-639) that enable authentication bypass. The issue arises during the reconnection phase of Bluetooth Low Energy (BLE) connections, where the device reuses the session key from a prior connection session. This flaw was published on 2025-03-13 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.
Attackers can exploit this vulnerability remotely over the network with low complexity and no required privileges, though user interaction is necessary. By leveraging the session key reuse, adversaries can bypass authentication mechanisms during reconnection, executing security bypass attacks that grant unauthorized access to the affected device.
References include the official Espressif ESP-IDF GitHub repository at https://github.com/espressif/esp-idf and a proof-of-concept demonstrating session key reuse at https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md, though specific mitigation or patch details are not detailed in available information.
Details
- CWE(s)