CVE-2024-53845
Espressif ESP-IDF Tools vulnerability analysis and mitigation

Overview

ESPTouch is a connection protocol for internet of things devices that includes a vulnerability in its ESPTouchV2 protocol implementation. Prior to versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8, while there was an option to use a custom AES key, there was no option to set the Initialization Vector (IV). The IV was set to zero and remained constant throughout the product's lifetime (GitHub Advisory).

Technical details

In AES/CBC mode encryption, if the IV is not properly initialized and remains constant (zero in this case), the encrypted output becomes deterministic. This implementation weakness is tracked as CWE-909 (Missing Initialization of Resource) and CWE-327 (Use of a Broken or Risky Cryptographic Algorithm). The vulnerability has been assigned a CVSS v4.0 score of 6.6 (MEDIUM) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U (GitHub Advisory).

Impact

The use of a constant IV in AES/CBC mode leads to deterministic encryption output, which can result in potential data leakage. This weakness could allow attackers to obtain sensitive information about encrypted messages (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in versions 5.3.2, 5.2.4, 5.1.6, and 5.0.8. The fix generates a random IV when activating the AES key, which is then transmitted along with the provisioning data to the provisioning device. The provisioning device has been equipped with a parser for the AES IV. Users must upgrade to the patched versions as there are no alternative workarounds (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Espressif ESP-IDF Tools vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65092MEDIUM6.9
  • Espressif ESP-IDF ToolsEspressif ESP-IDF Tools
  • cpe:2.3:a:espressif:esp-idf
NoYesNov 21, 2025
CVE-2025-64342MEDIUM6.9
  • Espressif ESP-IDF ToolsEspressif ESP-IDF Tools
  • cpe:2.3:a:espressif:esp-idf
NoYesNov 17, 2025
CVE-2025-68474MEDIUM6.1
  • Espressif ESP-IDF ToolsEspressif ESP-IDF Tools
  • cpe:2.3:a:espressif:esp-idf
NoYesDec 27, 2025
CVE-2025-66409LOW2.7
  • Espressif ESP-IDF ToolsEspressif ESP-IDF Tools
  • cpe:2.3:a:espressif:esp-idf
NoYesDec 02, 2025
CVE-2025-68473NONEN/A
  • Espressif ESP-IDF ToolsEspressif ESP-IDF Tools
  • cpe:2.3:a:espressif:esp-idf
NoYesDec 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management