ESP-NOW Protocol Analysis and Vulnerability Research

Nozomi Networks conducted a comprehensive security analysis and dissection of the ESP-NOW protocol, and this white paper details the findings from our research. We begin by outlining the main features of ESP-NOW and dissecting the frame format utilized in the protocol. Following this introduction, we explain our vulnerability assessment process, which employed automated code analysis tools such as SemGrep and Weggli. These tools helped us identify critical segments of the code that required further investigation.

Ultimately, our research uncovered two potential vulnerabilities. The first, an Out-of-Band read access, was determined to be non-exploitable upon deeper analysis. The second, a replay attack vulnerability, proved to be exploitable. We provide a detailed analysis of this vulnerability and include a proof of concept to demonstrate the potential security implications associated with ESP-NOW.

View Resource

Speakers

ESP-NOW Protocol Analysis and Vulnerability Research
White Papers

ESP-NOW Protocol Analysis and Vulnerability Research

March 26, 2025

Nozomi Networks conducted a comprehensive security analysis and dissection of the ESP-NOW protocol, and this white paper details the findings from our research. We begin by outlining the main features of ESP-NOW and dissecting the frame format utilized in the protocol. Following this introduction, we explain our vulnerability assessment process, which employed automated code analysis tools such as SemGrep and Weggli. These tools helped us identify critical segments of the code that required further investigation.

Ultimately, our research uncovered two potential vulnerabilities. The first, an Out-of-Band read access, was determined to be non-exploitable upon deeper analysis. The second, a replay attack vulnerability, proved to be exploitable. We provide a detailed analysis of this vulnerability and include a proof of concept to demonstrate the potential security implications associated with ESP-NOW.

Nozomi Networks conducted a comprehensive security analysis and dissection of the ESP-NOW protocol, and this white paper details the findings from our research. We begin by outlining the main features of ESP-NOW and dissecting the frame format utilized in the protocol. Following this introduction, we explain our vulnerability assessment process, which employed automated code analysis tools such as SemGrep and Weggli. These tools helped us identify critical segments of the code that required further investigation.

Ultimately, our research uncovered two potential vulnerabilities. The first, an Out-of-Band read access, was determined to be non-exploitable upon deeper analysis. The second, a replay attack vulnerability, proved to be exploitable. We provide a detailed analysis of this vulnerability and include a proof of concept to demonstrate the potential security implications associated with ESP-NOW.

SPEAKERS

Nozomi Networks conducted a comprehensive security analysis and dissection of the ESP-NOW protocol, and this white paper details the findings from our research. We begin by outlining the main features of ESP-NOW and dissecting the frame format utilized in the protocol. Following this introduction, we explain our vulnerability assessment process, which employed automated code analysis tools such as SemGrep and Weggli. These tools helped us identify critical segments of the code that required further investigation.

Ultimately, our research uncovered two potential vulnerabilities. The first, an Out-of-Band read access, was determined to be non-exploitable upon deeper analysis. The second, a replay attack vulnerability, proved to be exploitable. We provide a detailed analysis of this vulnerability and include a proof of concept to demonstrate the potential security implications associated with ESP-NOW.

IN PARTNERSHIP WITH
No items found.
SPEAKERS
Watch More
|
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
No items found.
Learn more link

ESP-NOW Protocol Analysis and Vulnerability Research

Nozomi Networks conducted a comprehensive security analysis and dissection of the ESP-NOW protocol, and this white paper details the findings from our research. We begin by outlining the main features of ESP-NOW and dissecting the frame format utilized in the protocol. Following this introduction, we explain our vulnerability assessment process, which employed automated code analysis tools such as SemGrep and Weggli. These tools helped us identify critical segments of the code that required further investigation.

Ultimately, our research uncovered two potential vulnerabilities. The first, an Out-of-Band read access, was determined to be non-exploitable upon deeper analysis. The second, a replay attack vulnerability, proved to be exploitable. We provide a detailed analysis of this vulnerability and include a proof of concept to demonstrate the potential security implications associated with ESP-NOW.

Subscribe to our newsletter

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.