Replies: 4 comments 23 replies
-
|
Espressif released an update to ESP-IDF which includes patches for the FragAttacks CVEs. See their Security Advisory.
At the moment, Arduino core 1.0.6 still uses ESP-IDF 3.3.5. We will update it as soon as a new core become available. |
Beta Was this translation helpful? Give feedback.
-
|
Additionally we should consider configuration options to disable telnet/http (only MQTT-operation). Also implement some extra security like encryption for MQTT client like SSL/TLS as HA already supports it. |
Beta Was this translation helpful? Give feedback.
-
|
Not FragAttacks, but still interesting read: |
Beta Was this translation helpful? Give feedback.
-
|
FragAttack has been fixed in arduino-esp32 v2.0.0 Now the platformio framework needs to update too, so we can use it. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
@fvanroie please have a look at the latest Wifi vulnerabilities discussion on Tasmota:
arendst/Tasmota#12104
How deep should we be concerned?
Eg. I'm thinking of this:
How can the adversary construct unencrypted Wi-Fi frames so they are accepted by a vulnerable device? First, certain Wi-Fi devices accept any unencrypted frame even when connected to a protected Wi-Fi network. This means the attacker doesn't have to do anything special! Two of out of four tested home routers were affected by this vulnerability, several internet-of-things devices were affected, and some smartphones were affected.
Beta Was this translation helpful? Give feedback.
All reactions