{"id":"CVE-2019-12588","details":"The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.","modified":"2026-04-11T21:44:34.496456Z","published":"2019-09-04T12:15:11.107Z","references":[{"type":"WEB","url":"https://github.com/espressif"},{"type":"EVIDENCE","url":"https://github.com/Matheus-Garbelini/esp32_esp8266_attacks"},{"type":"EVIDENCE","url":"https://matheus-garbelini.github.io/home/post/esp8266-beacon-frame-crash/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/esp8266/arduino","events":[{"introduced":"0"},{"last_affected":"8b899c12fb5044a6a51b92501bfcdf86a3d98dd8"},{"introduced":"de3058fc43f8a3298f472dfbea2b79854c3a08aa"},{"last_affected":"8ae300d4760b422cef4ee15cbabfb39dcb469216"}],"database_specific":{"cpe":["cpe:2.3:a:espressif:arduino_esp8266:*:*:*:*:*:*:*:*","cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"0"},{"last_affected":"2.5.2"},{"introduced":"2.2.0"},{"last_affected":"3.1.0"}],"source":"CPE_FIELD"}}],"versions":["2.2.0","2.3.0","2.3.0-rc1","2.3.0-rc2","2.4.0","2.4.0-rc1","2.4.0-rc2","2.4.1","2.4.2","2.5.0","2.5.0-beta1","2.5.0-beta2","2.5.0-beta3","2.5.1","2.5.2","2.6.0","2.6.1","2.6.2","2.6.3","2.7.0","2.7.1","2.7.2","3.0.0","3.0.1","3.0.2","3.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-12588.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}