CVE-2022-46401

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:microchip:bm78_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:bm78:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:microchip:bm83_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:bm83:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:microchip:rn4870_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:rn4870:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:microchip:rn4871_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:rn4871:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:microchip:bm70_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:bm70:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:microchip:bm71_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:bm71:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:microchip:pic_lightblue_explorer_demo_firmware:4.2_dt100112:*:*:*:*:*:*:*
cpe:2.3:h:microchip:pic_lightblue_explorer_demo:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:microchip:pic32cx1012bz25048_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:microchip:pic32cx1012bz25048:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:microchip:wbz451_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:microchip:wbz451:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:microchip:rn4678_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:rn4678:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:microchip:bm77_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:bm77:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:microchip:bm64_firmware:1.43:*:*:*:*:*:*:*
cpe:2.3:h:microchip:bm64:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:30

Type Values Removed Values Added
References () https://microchip.com - Product () https://microchip.com - Product
References () https://www.computer.org/csdl/proceedings-article/sp/2023/933600a521/1He7Yja1AYM - Exploit, Technical Description, Third Party Advisory () https://www.computer.org/csdl/proceedings-article/sp/2023/933600a521/1He7Yja1AYM - Exploit, Technical Description, Third Party Advisory
References () https://www.computer.org/csdl/proceedings/sp/2023/1He7WWuJExG - Third Party Advisory () https://www.computer.org/csdl/proceedings/sp/2023/1He7WWuJExG - Third Party Advisory
References () https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/deviating-behaviors-in-bluetooth-le - Vendor Advisory () https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/deviating-behaviors-in-bluetooth-le - Vendor Advisory

Information

Published : 2022-12-19 23:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46401

Mitre link : CVE-2022-46401

CVE.ORG link : CVE-2022-46401


JSON object : View

Products Affected

microchip

  • pic32cx1012bz25048
  • bm64
  • bm78
  • bm83_firmware
  • bm70_firmware
  • wbz451
  • rn4871_firmware
  • rn4871
  • rn4678
  • bm70
  • bm64_firmware
  • bm71
  • bm78_firmware
  • pic_lightblue_explorer_demo_firmware
  • wbz451_firmware
  • pic_lightblue_explorer_demo
  • rn4678_firmware
  • bm71_firmware
  • pic32cx1012bz25048_firmware
  • bm77
  • rn4870_firmware
  • bm77_firmware
  • rn4870
  • bm83