Описание
The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user intervention is required to restart the device and restore Bluetooth communication.
Ссылки
- Technical DescriptionThird Party Advisory
- Third Party Advisory
- Broken LinkVendor Advisory
- Technical DescriptionThird Party Advisory
- Third Party Advisory
- Broken LinkVendor Advisory
Уязвимые конфигурации
Одновременно
Одновременно
Одновременно
Одновременно
Одновременно
EPSS
6.5 Medium
CVSS3
6.1 Medium
CVSS2
Дефекты
Связанные уязвимости
The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user intervention is required to restart the device and restore Bluetooth communication.
Уязвимость реализации Bluetooth Classic микропрограммного обеспечения устройств Zhuhai Jieli ATS2815 и ATS2819, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
6.5 Medium
CVSS3
6.1 Medium
CVSS2