Description
The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0 does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after paging procedure. User intervention is required to restart the device.
Related CPE's
Vulnerable
References
https://github.com/Jieli-Tech/fw-AC63_BT_SDK
Third Party Advisory
https://launchstudio.bluetooth.com/ListingDetails/91371
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 · Medium
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-09-07T07:15:07.237
3 years agoLast modified
2021-09-14T13:57:22.913
3 years ago