CVE-2026-25507

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a use-after-free vulnerability was reported in the BLE provisioning transport (protocomm_ble) layer. The issue can be triggered by a remote BLE client while the device is in provisioning mode. The vulnerability occurred when provisioning was stopped with keep_ble_on = true. In this configuration, internal protocomm_ble state and GATT metadata were freed while the BLE stack and GATT services remained active. Subsequent BLE read or write callbacks dereferenced freed memory, allowing a connected or newly connected client to trigger invalid memory acces. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.5.2:*:*:*:*:*:*:*

History

20 Feb 2026, 17:12

Type Values Removed Values Added
CPE cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
References () https://github.com/espressif/esp-idf/commit/0540c85140c2c06c0cbecc8843277ea676d5c4a9 - () https://github.com/espressif/esp-idf/commit/0540c85140c2c06c0cbecc8843277ea676d5c4a9 - Patch
References () https://github.com/espressif/esp-idf/commit/1ff264abf2504cade46f0ce3a03f821310bcf6d7 - () https://github.com/espressif/esp-idf/commit/1ff264abf2504cade46f0ce3a03f821310bcf6d7 - Patch
References () https://github.com/espressif/esp-idf/commit/47552ff4fd824caf38215468ebd2f31fb5f36d70 - () https://github.com/espressif/esp-idf/commit/47552ff4fd824caf38215468ebd2f31fb5f36d70 - Patch
References () https://github.com/espressif/esp-idf/commit/4c3fdcd316f780bab4ae5aa73c9626ea9fe24ac6 - () https://github.com/espressif/esp-idf/commit/4c3fdcd316f780bab4ae5aa73c9626ea9fe24ac6 - Patch
References () https://github.com/espressif/esp-idf/commit/894c28afe3f2f8f31ff25b64191883517dddb5cf - () https://github.com/espressif/esp-idf/commit/894c28afe3f2f8f31ff25b64191883517dddb5cf - Patch
References () https://github.com/espressif/esp-idf/commit/cde7b7362adc15638c141c249681cbe5d23de663 - () https://github.com/espressif/esp-idf/commit/cde7b7362adc15638c141c249681cbe5d23de663 - Patch
References () https://github.com/espressif/esp-idf/commit/dba9a7dc01e4dab14c77d328f6a6f46369aeee63 - () https://github.com/espressif/esp-idf/commit/dba9a7dc01e4dab14c77d328f6a6f46369aeee63 - Patch
References () https://github.com/espressif/esp-idf/security/advisories/GHSA-h7r3-gmg9-xjmg - () https://github.com/espressif/esp-idf/security/advisories/GHSA-h7r3-gmg9-xjmg - Third Party Advisory
First Time Espressif
Espressif esp-idf
Summary
  • (es) ESF-IDF es el Framework de Desarrollo de Internet de las Cosas (IoT) de Espressif. En las versiones 5.5.2, 5.4.3, 5.3.4, 5.2.6 y 5.1.6, se informó una vulnerabilidad de uso después de liberación en la capa de transporte de aprovisionamiento BLE (protocomm_ble). El problema puede ser activado por un cliente BLE remoto mientras el dispositivo está en modo de aprovisionamiento. La vulnerabilidad ocurrió cuando el aprovisionamiento se detuvo con keep_ble_on = true. En esta configuración, el estado interno de protocomm_ble y los metadatos GATT fueron liberados mientras la pila BLE y los servicios GATT permanecieron activos. Las devoluciones de llamada de lectura o escritura BLE posteriores desreferenciaron memoria liberada, permitiendo a un cliente conectado o recién conectado activar un acceso a memoria inválido. Este problema ha sido parcheado en las versiones 5.5.3, 5.4.4, 5.3.5, 5.2.7 y 5.1.7.

04 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 18:16

Updated : 2026-02-20 17:12


NVD link : CVE-2026-25507

Mitre link : CVE-2026-25507

CVE.ORG link : CVE-2026-25507


JSON object : View

Products Affected

espressif

  • esp-idf
CWE
CWE-416

Use After Free