Cyber Posture

CVE-2024-53406

HighPublic PoC

Published: 13 March 2025

Published
13 March 2025
Modified
31 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53406 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Espressif Esp-Idf. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-11 (Re-authentication) and SC-12 (Cryptographic Key Establishment and Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires re-authentication upon reconnection, directly preventing authentication bypass via reuse of previous session keys.

prevent

Mandates proper cryptographic key establishment and management to avoid inappropriate reuse of session keys across BLE connections.

prevent

Protects communications session authenticity against exploitation of session key reuse for impersonation and bypass attacks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The auth bypass via BLE session key reuse enables remote exploitation of the vulnerable component for unauthorized access, mapping to exploitation of public-facing applications.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

Espressif Esp idf v5.3.0 is vulnerable to Insecure Permissions resulting in Authentication bypass. In the reconnection phase, the device reuses the session key from a previous connection session, creating an opportunity for attackers to execute security bypass attacks.

Deeper analysisAI

Espressif ESP-IDF version 5.3.0 contains a vulnerability classified as CVE-2024-53406, stemming from insecure permissions (CWE-639) that enable authentication bypass. The issue arises during the reconnection phase of Bluetooth Low Energy (BLE) connections, where the device reuses the session key from a prior connection session. This flaw was published on 2025-03-13 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.

Attackers can exploit this vulnerability remotely over the network with low complexity and no required privileges, though user interaction is necessary. By leveraging the session key reuse, adversaries can bypass authentication mechanisms during reconnection, executing security bypass attacks that grant unauthorized access to the affected device.

References include the official Espressif ESP-IDF GitHub repository at https://github.com/espressif/esp-idf and a proof-of-concept demonstrating session key reuse at https://github.com/yangting111/BLE_TEST/blob/main/result/PoC/Esp/sk_reuse.md, though specific mitigation or patch details are not detailed in available information.

Details

CWE(s)

Affected Products

espressif
esp-idf
5.3

CVEs Like This One

CVE-2026-25532Same product: Espressif Esp-Idf
CVE-2025-66409Same product: Espressif Esp-Idf
CVE-2025-40805Shared CWE-639
CVE-2026-4503Shared CWE-639
CVE-2026-40600Shared CWE-639
CVE-2023-53955Shared CWE-639
CVE-2020-36923Shared CWE-639
CVE-2026-33511Shared CWE-639
CVE-2026-39384Shared CWE-639
CVE-2025-14844Shared CWE-639

References