|
|
Bug Advisory Concerning ESP32-P4 DC-DC Design and Deep‑Sleep Wake‑up Stability
|
This advisory describes potential system instability issues caused by the ESP32-P4 DC-DC feedback resistor design and during deep sleep wake-up, and provides hardware and software mitigation recommendations.
|
v1.0 |
AR2025-005 |
Bugs |
2025.11.03 |
Fixed |
|
|
|
Security Advisory Follow-Up: Updates and Fixes Regarding ESP32 Undocumented Bluetooth Commands
|
This advisory describes the measures concerning the undocumented HCI commands in ESP32 Bluetooth controller. |
V1.0 |
AR2025-004 |
Security |
2025.05.22 |
Notification |
|
|
|
Compatibility Advisory for ESP32-C3 Chip Revision v1.1
|
This advisory describes the required software configurations to use ESP32-C3 chip revision v1.1 and its compatibility with chip revision v0.4. |
V1.1 |
AR2024-009 |
Compatibility |
2025.04.14 |
Announcement |
|
|
|
Compatibility Advisory for ESP32-H2 Chip Revision v1.2
|
This advisory describes the required software configurations to use ESP32-H2 chip revision v1.2 and its compatibility with pre-v1.2 chip. |
V1.0 |
AR2025-002 |
Compatibility |
2025.03.11 |
Announcement |
|
|
|
Compatibility Advisory for ESP32-C2 Chip Revision v2.0
|
This advisory describes the required software configurations to use ESP32-C2 chip revision v2.0 and its compatibility with pre-v2.0 chip. |
V1.0 |
AR2025-001 |
Compatibility |
2025.03.03 |
Announcement |
|
|
|
Bug Advisory on Updating Software Drivers for ESP32-H2 Chips in Low-Temperature Scenarios
|
This advisory describes the issue with the ESP32-H2 series products where the chip may fail to startup in low-temperature scenarios, along with the corresponding solutions. |
V1.0 |
AR2024-012 |
Bugs |
2025.02.25 |
Fixed with Commit |
|
|
|
Usage Instructions for Internal 32kHz RC Oscillator Clock Source in ESP32-C6 and Precaution
|
This advisory describes the issue with the ESP32-C6 series products where the RC32K_CLK may fail to oscillate in low-temperature scenarios, along with the corresponding solutions. |
V1.0 |
AR2024-011 |
Bugs |
2025.02.25 |
Fixed |
|
|
|
Security Advisory Concerning Timing Attacks on ECDSA Peripheral in ESP32-H2
|
This advisory describes a security vulnerability in the ESP32-H2 chip's (chip revision < v1.2) ECDSA peripheral, where timing differences in signature generation can lead to potential attacks, providing solutions such as enabling Secure Boot, updating ESP-IDF, and upgrading the chip revision to v1.2 for enhanced security. |
V1.0 |
AR2024-007 |
Security |
2024.11.26 |
Notification |
|
|
|
Bug Advisory Concerning Software Reset Failure on ESP32-S3 After OTA Upgrade to Specific ESP-IDF Versions with Quad SPI Flash Access Frequency Increased to 120 MHz
|
This advisory describes the issue of software reset failure on ESP32-S3 after OTA upgrade to specific ESP-IDF versions with Quad SPI Flash Access Frequency increased to 120 MHz, along with corresponding solutions. |
V1.0 |
AR2024-010 |
Bugs |
2024.10.12 |
Fixed |
|
|
|
Bug Advisory Concerning Applications Using Auto Light Sleep on ESP32-C6 with Certain ESP-IDF Versions
|
This advisory describes issues with certain ESP32-C6 products in applications where the Wi-Fi and Bluetooth LE modules coexist or when only the Wi-Fi module is initialized and auto light-sleep is enabled, along with the corresponding solutions. |
V1.0 |
AR2024-006 |
Bugs |
2024.08.30 |
Fixed with Commit |
|
|
|
Bug Advisory Concerning Data Corruption in RTC Memory of ESP32-C3 / ESP32-S3
|
The advisory describes two issues where improper power configuration leads to abnormal RTC memory data storage, along with the corresponding solutions. |
V1.0 |
AR2024-005 |
Bugs |
2024.08.15 |
Fixed |
|
|
|
Bug Advisory Concerning Low Wi-Fi Transmit Power on ESP32-C3 (chip revision v0.1 ~ v1.0)
|
This advisory describes and provides a solution for an issue that using specific PHY versions and configurations in ESP32-C3 chips (chip versions v0.1~v1.0) can result in a 20 dB decrease in Wi-Fi transmit power in certain ESP-IDF versions. |
V1.0 |
AR2024-002 |
Bugs |
2024.07.09 |
Fixed |
|
|
|
Bug Advisory Concerning Some Android Phones Being Unable to Scan the Advertising PDUs Sent by ESP32 Bluetooth LE
|
This advisory describes and provides solution about an issue in ESP32 concerning certain Android phones being unable to scan the advertising PDUs sent by Bluetooth LE when in the Wi-Fi and Bluetooth coexistence mode. |
V1.1 |
AR2024-001 |
Bugs |
2024.05.30 |
Fixed |
|
|
|
Bug Advisory for ESP32-C3’s Bluetooth LE Disconnection from iPhone in Bluetooth LE and Wi-Fi Coexistence Scenarios
|
This advisory describes the bug and solution for the Bluetooth LE ACL disconnection between certain new iPhone models and the ESP32-C3 series of products running specific ESP-IDF versions. Such disconnection will happen shortly after the connection is established when Wi-Fi and Bluetooth LE are used at the same time. |
V1.1 |
AR2023-002 |
Bugs |
2024.05.30 |
Fixed |
|
|
|
Security Advisory Concerning Bypassing Secure Boot and Flash Encryption using CPA and FI attack on ESP32-C3 and ESP32-C6
|
The advisory focuses on a crucial hardware vulnerability discovered in ESP32-C3 and ESP32-C6 chips. The vulnerability stems from a combination of Correlation Power Analysis (CPA), Fault Injection (FI), and buffer overflow, allowing attackers to bypass the Flash Encryption feature that uses the AES-XTS algorithm, extracting sensitive device information. Additionally, the advisory offers suggestions for hardware and application countermeasures that can effectively mitigate this type of attack. |
V1.0 |
AR2023-007 |
Security |
2024.01.08 |
Notification |
|
|
|
Security Advisory for USB_OTG & USB_Serial_JTAG Download Functions of ESP32-S3 Series Products
|
For ESP32-S3 series chips manufactured on and after Date Code 2219 and modules and development boards with the PW No. of and after PW-2022-06-XXXX, the bit (BLK0 B19[7]) will be open for users to program since it will not be programmed by default. This will enable the USB_OTG Download function. |
V1.1 |
AR2022-004 |
Security |
2022.12.21 |
Fixed |
|
|
|
Security Advisory Concerning Breaking the Hardware AES Core and Firmware Encryption of ESP32 Chip Revision v3.0
|
This security advisory provides an issue summary and impact analysis of the side-channel attack (SCA) and body bias injection (BBI), which allow attackers to exploit the power consumption trajectory characteristics of ESP32/ESP32-S2/ESP32-S3/ESP32-C3 series chips when performing encryption and decryption to obtain sensitive information in the chip. The advisory also provides practical tips for customers on using the ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C2 series chips.
|
V2.0 |
AR2022-003 |
Security |
2022.11.18 |
Notification |
|
|
|
Optimization of eFuse Programming for ESP32 / ESP32-C3 / ESP32-S2 / ESP32-S3 Series of Chips
|
This advisory describes a rare issue related to Secure Boot v1, Secure Boot v2, and/or flash encryption, and its solution. Note that, this issue can only happen when using specific versions of ESP-IDF for ESP32, ESP32-C3, and ESP32-S2 series products.
|
V1.0 |
AR2022-006 |
Application |
2022.09.26 |
Fixed |
|
|
|
Unable to Boot Few ESP32-C3 Products Using Certain ESP-IDF Versions
|
This bug advisory describes boot problems identified in the ESP32-C3 series of products, including chips, modules, and development boards, developed and produced based on ESP-IDF v4.3-rc and ESP-IDF v4.3. The bug is caused by improper parameter configurations in the chip's initialization software and has been fixed in ESP-IDF v4.3.1 and higher. |
V1.0 |
AR2021-006 |
Bugs |
2021.12.24 |
Fixed |
|
|
|
Security Advisory concerning fault injection and ESP32 Flash Encryption & Secure Boot V1
|
These attacks use similar methods and have similar impact to previously advised fault injection issues CVE-2019-15894 and CVE-2019-17391. The vulnerabilities exist in revision 0 and revision 1 of the ESP32 silicon including ESP32-D0WD, ESP32-D2WD, ESP32-S0WD, ESP32-PICO-D4, and modules based on these chips. |
V1.0 |
AR2020-001 |
Security |
2020.07.20 |
Notification |
|