#VU56309 Input validation error in AC6366C_DEMO_V1.0 and AC6366C BT SDK - CVE-2021-34144

 

#VU56309 Input validation error in AC6366C_DEMO_V1.0 and AC6366C BT SDK - CVE-2021-34144

Published: September 6, 2021


Vulnerability identifier: #VU56309
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-34144
CWE-ID: CWE-20
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
AC6366C_DEMO_V1.0
AC6366C BT SDK
Software vendor:
JieLi

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the Bluetooth Classic implementation does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active. A remote attacker in radio range can send a specially crafted LMP packet and perform a denial of service (DoS) attack.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links