-
-
Notifications
You must be signed in to change notification settings - Fork 4.4k
Mitigate CVE-2020-12638 WiFi WPA Downgrade #1207
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Co-authored-by: Lukas Bachschwell <lukas@lbsfilm.at>
Ok so I tested with the following config: wifi:
networks:
- ssid: 'Open Network'
priority: 100
- ssid: 'WPA2 Network'
password: 'the_password' Steps:
This is because the code doesn't know if it was previously connected or not. I won't fix that at this time because it's a minor annoyance that few people will experience (having multiple networks with different auth mode is unlikely). Also, something's up with GH actions today, the |
Co-authored-by: Lukas Bachschwell <lukas@lbsfilm.at>
Co-authored-by: Lukas Bachschwell <lukas@lbsfilm.at>
Co-authored-by: Lukas Bachschwell <lukas@lbsfilm.at>
Description:
Got contacted by @s00500 about a CVE for ESP8266/ESP32 where sending a specially crafted beacon frame during an active wifi connection can downgrade encrypted connections to open ones.
See also https://lbsfilm.at/blog/wpa2-authenticationmode-downgrade-in-espressif-microprocessors and esp8266/Arduino#7486
TODO:
Related issue (if applicable): fixes
Pull request in esphome-docs with documentation (if applicable): esphome/esphome-docs#
Checklist:
tests/
folder).If user exposed functionality or configuration variables are added/changed: