The Bluetooth Classic implementation in Silicon Labs iWRAP 6.3.0 and earlier does not properly handle the reception of an oversized LMP packet greater than 17 bytes, allowing attackers in radio range to trigger a crash in WT32i via a crafted LMP packet.
References
Link | Resource |
---|---|
https://dl.packetstormsecurity.net/papers/general/braktooth.pdf | Technical Description Third Party Advisory |
https://www.silabs.com/wireless/bluetooth/bluegiga-classic-legacy-modules/device.wt32i-a | Product Vendor Advisory |
https://dl.packetstormsecurity.net/papers/general/braktooth.pdf | Technical Description Third Party Advisory |
https://www.silabs.com/wireless/bluetooth/bluegiga-classic-legacy-modules/device.wt32i-a | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://dl.packetstormsecurity.net/papers/general/braktooth.pdf - Technical Description, Third Party Advisory | |
References | () https://www.silabs.com/wireless/bluetooth/bluegiga-classic-legacy-modules/device.wt32i-a - Product, Vendor Advisory |
Information
Published : 2021-09-07 07:15
Updated : 2024-11-21 06:05
NVD link : CVE-2021-31609
Mitre link : CVE-2021-31609
CVE.ORG link : CVE-2021-31609
JSON object : View
Products Affected
silabs
- iwrap
- wt32i-a
CWE