Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3646-mf8v-hr3c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

EPSS

Процентиль: 34%
0.00138
Низкий

Связанные уязвимости

CVSS3: 6.5
nvd
больше 4 лет назад

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

CVSS3: 6.5
fstec
больше 4 лет назад

Уязвимость реализации Bluetooth Classic платформы для разработки программного обеспечения Zhuhai Jieli AC6366C BT SDK, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 34%
0.00138
Низкий