The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices accepts a pairing request with a key size greater than 16 bytes, allowing an attacker in radio range to cause a buffer overflow and denial of service (crash) via crafted packets.
References
Link | Resource |
---|---|
http://www.telink-semi.com/ble | Vendor Advisory |
https://asset-group.github.io/disclosures/sweyntooth/ | Exploit Third Party Advisory |
http://www.telink-semi.com/ble | Vendor Advisory |
https://asset-group.github.io/disclosures/sweyntooth/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.telink-semi.com/ble - Vendor Advisory | |
References | () https://asset-group.github.io/disclosures/sweyntooth/ - Exploit, Third Party Advisory |
Information
Published : 2020-02-12 15:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19196
Mitre link : CVE-2019-19196
CVE.ORG link : CVE-2019-19196
JSON object : View
Products Affected
telink-semi
- tlsr8251_ble_sdk
- tlsr8232
- tlsr8232_ble_sdk
- tlsr8269_ble_sdk
- tlsr8269
- tlsr8251
- tlsr8258_ble_sdk
- tlsr8258
- tlsr8253
- tlsr8253_ble_sdk
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')