• Advisories

Found 7 results
Select All Title 正文 Version Advisory No. Type Released Date Fixed Status Download
Bug Advisory Concerning Data Corruption in RTC Memory of ESP32-C3 / ESP32-S3

The advisory describes two issues where improper power configuration leads to abnormal RTC memory data storage, along with the corresponding solutions.

V1.0 AR2024-005 Bugs 2024.08.15 Fixed
Compatibility Advisory for ESP32-C3 Chip Revision v1.1

This advisory describes the required software configurations to use ESP32-C3 chip revision v1.1 and its compatibility with chip revision v0.4.

V1.0 AR2024-009 Compatibility 2024.07.22 Announcement
Bug Advisory Concerning Low Wi-Fi Transmit Power on ESP32-C3 (chip revision v0.1 ~ v1.0)

This advisory describes and provides a solution for an issue that using specific PHY versions and configurations in ESP32-C3 chips (chip versions v0.1~v1.0) can result in a 20 dB decrease in Wi-Fi transmit power in certain ESP-IDF versions.

V1.0 AR2024-002 Bugs 2024.07.09 Fixed
Bug Advisory for ESP32-C3’s Bluetooth LE Disconnection from iPhone in Bluetooth LE and Wi-Fi Coexistence Scenarios

This advisory describes the bug and solution for the Bluetooth LE ACL disconnection between certain new iPhone models and the ESP32-C3 series of products running specific ESP-IDF versions. Such disconnection will happen shortly after the connection is established when Wi-Fi and Bluetooth LE are used at the same time.

V1.1 AR2023-002 Bugs 2024.05.30 Fixed
Security Advisory Concerning Bypassing Secure Boot and Flash Encryption using CPA and FI attack on ESP32-C3 and ESP32-C6

The advisory focuses on a crucial hardware vulnerability discovered in ESP32-C3 and ESP32-C6 chips. The vulnerability stems from a combination of Correlation Power Analysis (CPA), Fault Injection (FI), and buffer overflow, allowing attackers to bypass the Flash Encryption feature that uses the AES-XTS algorithm, extracting sensitive device information. Additionally, the advisory offers suggestions for hardware and application countermeasures that can effectively mitigate this type of attack.

V1.0 AR2023-007 Security 2024.01.08 Notification
Optimization of eFuse Programming for ESP32 / ESP32-C3 / ESP32-S2 / ESP32-S3 Series of Chips
This advisory describes a rare issue related to Secure Boot v1, Secure Boot v2, and/or flash encryption, and its solution. Note that, this issue can only happen when using specific versions of ESP-IDF for ESP32, ESP32-C3, and ESP32-S2 series products.

V1.0 AR2022-006 Application 2022.09.26 Fixed
Unable to Boot Few ESP32-C3 Products Using Certain ESP-IDF Versions

This bug advisory describes boot problems identified in the ESP32-C3 series of products, including chips, modules, and development boards, developed and produced based on ESP-IDF v4.3-rc and ESP-IDF v4.3. The bug is caused by improper parameter configurations in the chip's initialization software and has been fixed in ESP-IDF v4.3.1 and higher.

V1.0 AR2021-006 Bugs 2021.12.24 Fixed





Advisory type