The Bluetooth Classic implementation on AB32VG1 devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (either restart or deadlock the device) by flooding a device with LMP_AU_rand data.
2021-09-07T07:15:06.990
2024-11-21T06:05:59.733
Modified
CVSSv3.1: 6.5 (MEDIUM)
AV:A/AC:L/Au:N/C:N/I:N/A:C
6.5
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | mi | mi_true_wireless_earbuds_basic_2_firmware | - | Yes |
Hardware | mi | mi_true_wireless_earbuds_basic_2 | - | No |
Operating System | bluetrum | ab5376t_firmware | - | Yes |
Hardware | bluetrum | ab5376t | - | No |
Operating System | bluetrum | bt8896a_firmware | - | Yes |
Hardware | bluetrum | bt8896a | - | No |