Texas Instruments CC256x and WL18xx dual-mode Bluetooth controller devices, when LE scan mode is used, allow remote attackers to trigger a buffer overflow via a malformed Bluetooth Low Energy advertising packet, to cause a denial of service or potentially execute arbitrary code. This affects CC256xC-BT-SP 1.2, CC256xB-BT-SP 1.8, and WL18xx-BT-SP 4.4.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://e2e.ti.com/support/wireless-connectivity/bluetooth/f/538/t/856161 - Third Party Advisory | |
References | () https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/ti_wl18xx_adv_rce.py - | |
References | () https://github.com/darkmentorllc/publications/tree/master/2020/TI_SILABS_BLE_RCEs - | |
References | () https://www.linkedin.com/in/veronica-kovah-2587185 - Not Applicable | |
References | () https://www.youtube.com/watch?v=bk5lOxieqbA - |
Information
Published : 2019-11-13 16:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15948
Mitre link : CVE-2019-15948
CVE.ORG link : CVE-2019-15948
JSON object : View
Products Affected
ti
- wl18xx-bt-sp
- cc256xc-bt-sp_firmware
- cc256xb-bt-sp
- cc256xb-bt-sp_firmware
- cc256xc-bt-sp
- wl18xx-bt-sp_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')