Логотип exploitDog
bind:CVE-2021-34150
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-34150

Количество 3

Количество 3

nvd логотип

CVE-2021-34150

больше 4 лет назад

The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-gxwg-94gc-r879

больше 3 лет назад

The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

EPSS: Низкий
fstec логотип

BDU:2021-04909

больше 4 лет назад

Уязвимость реализации Bluetooth Classic микропрограммного обеспечения устройства Bluetrum AB5301A, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-34150

The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-gxwg-94gc-r879

The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04909

Уязвимость реализации Bluetooth Classic микропрограммного обеспечения устройства Bluetrum AB5301A, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу