<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[ESP32&#x2F;ESP8266  (CVE-2019-12586) and (CVE-2019-12587)]]></title><description><![CDATA[<p dir="auto">hi all,<br />
Look like core code must be updated asap.<br />
Patch<br />
<a href="https://github.com/espressif/esp-idf/commit/8009320fb44abaf8acf8a1e1a38a67fc4c8d458c" target="_blank" rel="noopener noreferrer nofollow ugc">https://github.com/espressif/esp-idf/commit/8009320fb44abaf8acf8a1e1a38a67fc4c8d458c</a></p>
<p dir="auto">ESP32/ESP8266 EAP client crash (CVE-2019-12586)<br />
Crashing ESP devices connected to enterprise networks</p>
<p dir="auto">And another<br />
Zero PMK Installation (CVE-2019-12587)<br />
Hijacking ESP32/ESP8266 clients connected to enterprise networks</p>
]]></description><link>https://community.m5stack.com/topic/1287/esp32-esp8266-cve-2019-12586-and-cve-2019-12587</link><generator>RSS for Node</generator><lastBuildDate>Mon, 11 May 2026 14:20:27 GMT</lastBuildDate><atom:link href="https://community.m5stack.com/topic/1287.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 04 Sep 2019 07:53:44 GMT</pubDate><ttl>60</ttl></channel></rss>