CVE-2025-65821
UART · UART Multiple Products
A high-severity vulnerability has been identified in multiple products utilizing the ESP32 chip, where a manufacturing download mode has been left enabled.
Executive summary
A high-severity vulnerability has been identified in multiple products utilizing the ESP32 chip, where a manufacturing download mode has been left enabled. This allows an attacker with physical access to the device to connect to it and extract the entire contents of its memory, exposing sensitive information such as stored Wi-Fi credentials. Successful exploitation could lead to a breach of network security and the compromise of other sensitive data stored on the device.
Vulnerability
The vulnerability exists because the UART download mode on the ESP32 microcontroller is not permanently disabled after the initial factory programming. This mode is a built-in feature of the chip used for flashing firmware. An attacker with physical access to a vulnerable device can connect to its UART interface, reboot the chip into download mode, and use standard, publicly available tools (e.g., esptool.py) to issue a command to read the device's entire flash memory. This memory dump can then be analyzed offline to extract sensitive data from the Non-Volatile Storage (NVS) partition, which commonly stores configuration details like Wi-Fi SSIDs and passwords, API keys, and device certificates.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation results in a direct loss of confidentiality. The primary business impact is the exposure of network credentials, which could allow an attacker to gain unauthorized access to the Wi-Fi network where the device is deployed. This access could be used as a pivot point to attack other systems on the same network, leading to a wider security breach. Furthermore, the disclosure of other sensitive data like API keys or proprietary configuration information could compromise backend services or expose intellectual property, posing a significant risk to operational security and customer trust.
Remediation
Immediate Action: Apply vendor-provided security updates and firmware patches to all affected devices immediately. These updates are expected to permanently disable the UART download mode, likely by blowing a one-time programmable (OTP) eFuse on the chip. In parallel, security teams should actively monitor for any signs of exploitation and review system and network access logs for suspicious activity.
Proactive Monitoring: As exploitation requires physical access, monitoring should focus on both physical and network-level indicators. Implement checks for physical tampering on deployed devices. On the network, monitor for unauthorized devices connecting to wireless networks, which could indicate that credentials have been compromised and are in use. Review device logs, if available, for evidence of unexpected reboots or system resets.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
- Physical Security: Ensure all vulnerable devices are located in physically secure areas with restricted access to prevent unauthorized connections.
- Network Segmentation: Isolate IoT and other embedded devices on a dedicated network segment (VLAN) firewalled from critical corporate or user networks. This limits an attacker's ability to move laterally even if they obtain the Wi-Fi credentials for the isolated segment.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Immediate patching of all affected devices is strongly recommended to prevent the unauthorized disclosure of sensitive information. Given the High severity rating (CVSS 7.5), the risk of network compromise resulting from a successful attack is significant, even though it requires physical access. This vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating no widespread, active exploitation has been observed. Organizations should prioritize identifying all vulnerable assets within their environment and deploying the vendor-supplied firmware updates without delay. If patching must be postponed, the compensating controls of enhanced physical security and network segmentation should be implemented as a critical priority.