
Cloud Vulnerability DB
A community-led vulnerabilities database
A Buffer Overflow vulnerability exists in esp-idf version 5.1 that allows a remote attacker to obtain sensitive information through the externalId component. The vulnerability was discovered and disclosed on October 17, 2024, and affects esp-idf framework systems (NVD, CVE).
The vulnerability is classified as a Classic Buffer Overflow (CWE-120) that occurs in the externalId component. The CVSS v3.1 base score is 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N, indicating a network-accessible vulnerability with low attack complexity requiring low privileges and no user interaction (NVD).
The vulnerability allows remote attackers to obtain sensitive information through improper object-level access control. When successfully exploited, it enables unauthorized access to sensitive data by manipulating the id parameter linked to the externalId component (GitHub).
To mitigate this vulnerability, it is recommended to implement robust object-level access controls within the esp-idf framework to restrict access based on user roles and permissions. Additionally, proper validation and sanitization of user inputs should be implemented, particularly for URL parameters like id that could control access to sensitive information (GitHub).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."