SB2021090605 - Multiple vulnerabilities in Actions Technology ATS2815/ATS2819
Published: September 6, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2021-28135)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the Bluetooth Classic implementation does not properly handle the reception of continuous unsolicited LMP responses. A remote attacker in radio range can send LMP Feature Response data and perform a denial of service (DoS) attack.
2) Input validation error (CVE-ID: CVE-2021-28155)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the Bluetooth Classic implementation does not properly handle the reception of continuous unsolicited LMP responses. A remote attacker in radio range can send LMP Feature Response data and perform a denial of service (DoS) attack.
3) Input validation error (CVE-ID: CVE-2021-31717)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the Bluetooth Classic implementation does not properly handle the reception of continuous unsolicited LMP responses. A remote attacker in radio range can send LMP Feature Response data and perform a denial of service (DoS) attack.
4) Input validation error (CVE-ID: CVE-2021-31785)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the Bluetooth Classic implementation does not properly handle the reception of multiple LMP_host_connection_req. A remote attacker in radio range can pass specially crafted input to the application and perform a denial of service (DoS) attack.
5) Input validation error (CVE-ID: CVE-2021-31786)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the Bluetooth Classic Audio implementation may not properly handle a connection attempt from a host with the same BDAddress as the currently connected BT host. A remote attacker in radio range can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.