Description
The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0 does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after paging procedure. User intervention is required to restart the device.
Related CPE's
References
https://github.com/Jieli-Tech/fw-AC63_BT_SDK
https://launchstudio.bluetooth.com/ListingDetails/91371
https://github.com/Jieli-Tech/fw-AC63_BT_SDK
https://launchstudio.bluetooth.com/ListingDetails/91371
CVSS impact metrics
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2021-09-07T05:15:07.237Z
4 years agoLast modified
2024-11-21T05:09:56.567Z
1 year ago