CVE-2021-31610

The Bluetooth Classic implementation on AB32VG1 devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (either restart or deadlock the device) by flooding a device with LMP_AU_rand data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mi:mi_true_wireless_earbuds_basic_2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mi:mi_true_wireless_earbuds_basic_2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:bluetrum:ab5376t_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:bluetrum:ab5376t:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:bluetrum:bt8896a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:bluetrum:bt8896a:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:05

Type Values Removed Values Added
References () http://www.bluetrum.com/product/ab5376t.html - Product, Vendor Advisory () http://www.bluetrum.com/product/ab5376t.html - Product, Vendor Advisory
References () http://www.bluetrum.com/product/bt8896a.html - Product, Vendor Advisory () http://www.bluetrum.com/product/bt8896a.html - Product, Vendor Advisory
References () https://dl.packetstormsecurity.net/papers/general/braktooth.pdf - Broken Link () https://dl.packetstormsecurity.net/papers/general/braktooth.pdf - Broken Link
References () https://www.mi.com/global/mi-true-wireless-earbuds-basic-2/ - Not Applicable () https://www.mi.com/global/mi-true-wireless-earbuds-basic-2/ - Not Applicable

Information

Published : 2021-09-07 07:15

Updated : 2024-11-21 06:05


NVD link : CVE-2021-31610

Mitre link : CVE-2021-31610

CVE.ORG link : CVE-2021-31610


JSON object : View

Products Affected

mi

  • mi_true_wireless_earbuds_basic_2
  • mi_true_wireless_earbuds_basic_2_firmware

bluetrum

  • ab5376t_firmware
  • bt8896a
  • bt8896a_firmware
  • ab5376t