Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3fq3-m842-mpf8

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Bluetooth Classic implementation on the Texas Instruments CC256XCQFN-EM does not properly handle the reception of continuous LMP_AU_Rand packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after the paging procedure.

The Bluetooth Classic implementation on the Texas Instruments CC256XCQFN-EM does not properly handle the reception of continuous LMP_AU_Rand packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after the paging procedure.

EPSS

Процентиль: 36%
0.00147
Низкий

Связанные уязвимости

CVSS3: 6.5
nvd
больше 4 лет назад

The Bluetooth Classic implementation on the Texas Instruments CC256XCQFN-EM does not properly handle the reception of continuous LMP_AU_Rand packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after the paging procedure.

CVSS3: 6.5
fstec
больше 4 лет назад

Уязвимость реализации Bluetooth Classic микропрограммного обеспечения устройств CC256xCQFN-EM, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 36%
0.00147
Низкий