The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices installs a zero long term key (LTK) if an out-of-order link-layer encryption request is received during Secure Connections pairing. An attacker in radio range can have arbitrary read/write access to protected GATT service data, cause a device crash, or possibly control a device's function by establishing an encrypted session with the zero LTK.
References
Link | Resource |
---|---|
http://www.telink-semi.com/ble | Vendor Advisory |
https://asset-group.github.io/disclosures/sweyntooth/ | Exploit Third Party Advisory |
http://www.telink-semi.com/ble | Vendor Advisory |
https://asset-group.github.io/disclosures/sweyntooth/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.telink-semi.com/ble - Vendor Advisory | |
References | () https://asset-group.github.io/disclosures/sweyntooth/ - Exploit, Third Party Advisory |
Information
Published : 2020-02-12 15:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19194
Mitre link : CVE-2019-19194
CVE.ORG link : CVE-2019-19194
JSON object : View
Products Affected
telink-semi
- tlsr8251_ble_sdk
- tlsr8232
- tlsr8232_ble_sdk
- tlsr8269_ble_sdk
- tlsr8269
- tlsr8251
- tlsr8258_ble_sdk
- tlsr8258
- tlsr8253
- tlsr8253_ble_sdk
CWE