CVE-2021-31610

The Bluetooth Classic implementation on AB32VG1 devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (either restart or deadlock the device) by flooding a device with LMP_AU_rand data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mi:mi_true_wireless_earbuds_basic_2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mi:mi_true_wireless_earbuds_basic_2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:bluetrum:ab5376t_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:bluetrum:ab5376t:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:bluetrum:bt8896a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:bluetrum:bt8896a:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-09-07 07:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-31610

Mitre link : CVE-2021-31610

CVE.ORG link : CVE-2021-31610


JSON object : View

Products Affected

mi

  • mi_true_wireless_earbuds_basic_2_firmware
  • mi_true_wireless_earbuds_basic_2

bluetrum

  • bt8896a_firmware
  • ab5376t_firmware
  • bt8896a
  • ab5376t