Found 20 results
Select All Title 正文 Version Advisory No. Type Released Date Fixed Status Download
Bug Advisory Concerning ESP32-P4 DC-DC Design and Deep‑Sleep Wake‑up Stability
This advisory describes potential system instability issues caused by the ESP32-P4 DC-DC feedback resistor design and during deep sleep wake-up, and provides hardware and software mitigation recommendations. v1.0 AR2025-005 Bugs 2025.11.03 Fixed
Security Advisory Follow-Up: Updates and Fixes Regarding ESP32 Undocumented Bluetooth Commands
This advisory describes the measures concerning the undocumented HCI commands in ESP32 Bluetooth controller. V1.0 AR2025-004 Security 2025.05.22 Notification
Compatibility Advisory for ESP32-C3 Chip Revision v1.1
This advisory describes the required software configurations to use ESP32-C3 chip revision v1.1 and its compatibility with chip revision v0.4. V1.1 AR2024-009 Compatibility 2025.04.14 Announcement
Compatibility Advisory for ESP32-H2 Chip Revision v1.2
This advisory describes the required software configurations to use ESP32-H2 chip revision v1.2 and its compatibility with pre-v1.2 chip. V1.0 AR2025-002 Compatibility 2025.03.11 Announcement
Compatibility Advisory for ESP32-C2 Chip Revision v2.0
This advisory describes the required software configurations to use ESP32-C2 chip revision v2.0 and its compatibility with pre-v2.0 chip. V1.0 AR2025-001 Compatibility 2025.03.03 Announcement
Bug Advisory on Updating Software Drivers for ESP32-H2 Chips in Low-Temperature Scenarios
This advisory describes the issue with the ESP32-H2 series products where the chip may fail to startup in low-temperature scenarios, along with the corresponding solutions. V1.0 AR2024-012 Bugs 2025.02.25 Fixed with Commit
Usage Instructions for Internal 32kHz RC Oscillator Clock Source in ESP32-C6 and Precaution
This advisory describes the issue with the ESP32-C6 series products where the RC32K_CLK may fail to oscillate in low-temperature scenarios, along with the corresponding solutions. V1.0 AR2024-011 Bugs 2025.02.25 Fixed
Security Advisory Concerning Timing Attacks on ECDSA Peripheral in ESP32-H2
This advisory describes a security vulnerability in the ESP32-H2 chip's (chip revision < v1.2) ECDSA peripheral, where timing differences in signature generation can lead to potential attacks, providing solutions such as enabling Secure Boot, updating ESP-IDF, and upgrading the chip revision to v1.2 for enhanced security. V1.0 AR2024-007 Security 2024.11.26 Notification
Bug Advisory Concerning Software Reset Failure on ESP32-S3 After OTA Upgrade to Specific ESP-IDF Versions with Quad SPI Flash Access Frequency Increased to 120 MHz
This advisory describes the issue of software reset failure on ESP32-S3 after OTA upgrade to specific ESP-IDF versions with Quad SPI Flash Access Frequency increased to 120 MHz, along with corresponding solutions. V1.0 AR2024-010 Bugs 2024.10.12 Fixed
Bug Advisory Concerning Applications Using Auto Light Sleep on ESP32-C6 with Certain ESP-IDF Versions
This advisory describes issues with certain ESP32-C6 products in applications where the Wi-Fi and Bluetooth LE modules coexist or when only the Wi-Fi module is initialized and auto light-sleep is enabled, along with the corresponding solutions. V1.0 AR2024-006 Bugs 2024.08.30 Fixed with Commit
Bug Advisory Concerning Data Corruption in RTC Memory of ESP32-C3 / ESP32-S3
The advisory describes two issues where improper power configuration leads to abnormal RTC memory data storage, along with the corresponding solutions. V1.0 AR2024-005 Bugs 2024.08.15 Fixed
Bug Advisory Concerning Low Wi-Fi Transmit Power on ESP32-C3 (chip revision v0.1 ~ v1.0)
This advisory describes and provides a solution for an issue that using specific PHY versions and configurations in ESP32-C3 chips (chip versions v0.1~v1.0) can result in a 20 dB decrease in Wi-Fi transmit power in certain ESP-IDF versions. V1.0 AR2024-002 Bugs 2024.07.09 Fixed
Bug Advisory Concerning Some Android Phones Being Unable to Scan the Advertising PDUs Sent by ESP32 Bluetooth LE
This advisory describes and provides solution about an issue in ESP32 concerning certain Android phones being unable to scan the advertising PDUs sent by Bluetooth LE when in the Wi-Fi and Bluetooth coexistence mode. V1.1 AR2024-001 Bugs 2024.05.30 Fixed
Bug Advisory for ESP32-C3’s Bluetooth LE Disconnection from iPhone in Bluetooth LE and Wi-Fi Coexistence Scenarios
This advisory describes the bug and solution for the Bluetooth LE ACL disconnection between certain new iPhone models and the ESP32-C3 series of products running specific ESP-IDF versions. Such disconnection will happen shortly after the connection is established when Wi-Fi and Bluetooth LE are used at the same time. V1.1 AR2023-002 Bugs 2024.05.30 Fixed
Security Advisory Concerning Bypassing Secure Boot and Flash Encryption using CPA and FI attack on ESP32-C3 and ESP32-C6
The advisory focuses on a crucial hardware vulnerability discovered in ESP32-C3 and ESP32-C6 chips. The vulnerability stems from a combination of Correlation Power Analysis (CPA), Fault Injection (FI), and buffer overflow, allowing attackers to bypass the Flash Encryption feature that uses the AES-XTS algorithm, extracting sensitive device information. Additionally, the advisory offers suggestions for hardware and application countermeasures that can effectively mitigate this type of attack. V1.0 AR2023-007 Security 2024.01.08 Notification
Security Advisory for USB_OTG & USB_Serial_JTAG Download Functions of ESP32-S3 Series Products
For ESP32-S3 series chips manufactured on and after Date Code 2219 and modules and development boards with the PW No. of and after PW-2022-06-XXXX, the bit (BLK0 B19[7]) will be open for users to program since it will not be programmed by default. This will enable the USB_OTG Download function.
V1.1 AR2022-004 Security 2022.12.21 Fixed
Security Advisory Concerning Breaking the Hardware AES Core and Firmware Encryption of ESP32 Chip Revision v3.0
This security advisory provides an issue summary and impact analysis of the side-channel attack (SCA) and body bias injection (BBI), which allow attackers to exploit the power consumption trajectory characteristics of ESP32/ESP32-S2/ESP32-S3/ESP32-C3 series chips when performing encryption and decryption to obtain sensitive information in the chip. The advisory also provides practical tips for customers on using the ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C2 series chips.

V2.0 AR2022-003 Security 2022.11.18 Notification
Optimization of eFuse Programming for ESP32 / ESP32-C3 / ESP32-S2 / ESP32-S3 Series of Chips
This advisory describes a rare issue related to Secure Boot v1, Secure Boot v2, and/or flash encryption, and its solution. Note that, this issue can only happen when using specific versions of ESP-IDF for ESP32, ESP32-C3, and ESP32-S2 series products. V1.0 AR2022-006 Application 2022.09.26 Fixed
Unable to Boot Few ESP32-C3 Products Using Certain ESP-IDF Versions
This bug advisory describes boot problems identified in the ESP32-C3 series of products, including chips, modules, and development boards, developed and produced based on ESP-IDF v4.3-rc and ESP-IDF v4.3. The bug is caused by improper parameter configurations in the chip's initialization software and has been fixed in ESP-IDF v4.3.1 and higher. V1.0 AR2021-006 Bugs 2021.12.24 Fixed
Security Advisory concerning fault injection and ESP32 Flash Encryption & Secure Boot V1

These attacks use similar methods and have similar impact to previously advised fault injection issues CVE-2019-15894 and CVE-2019-17391. The vulnerabilities exist in revision 0 and revision 1 of the ESP32 silicon including ESP32-D0WD, ESP32-D2WD, ESP32-S0WD, ESP32-PICO-D4, and modules based on these chips.

V1.0 AR2020-001 Security 2020.07.20 Notification





Advisory type