Description
The Bluetooth Classic implementation in Silicon Labs iWRAP 6.3.0 and earlier does not properly handle the reception of an oversized LMP packet greater than 17 bytes, allowing attackers in radio range to trigger a crash in WT32i via a crafted LMP packet.
References
https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
https://www.silabs.com/wireless/bluetooth/bluegiga-classic-legacy-modules/device.wt32i-a
https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
https://www.silabs.com/wireless/bluetooth/bluegiga-classic-legacy-modules/device.wt32i-a
CVSS impact metrics
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-09-07T05:15:06.940Z
4 years agoLast modified
2024-11-21T05:05:59.590Z
1 year ago