Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gxwg-94gc-r879

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

EPSS

Процентиль: 33%
0.00129
Низкий

Связанные уязвимости

CVSS3: 6.5
nvd
больше 4 лет назад

The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

CVSS3: 6.5
fstec
больше 4 лет назад

Уязвимость реализации Bluetooth Classic микропрограммного обеспечения устройства Bluetrum AB5301A, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 33%
0.00129
Низкий