Search Results (Refine Search)
- Keyword (text search): bluetooth
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-1902 |
The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer. Published: July 10, 2023; 12:15:49 PM -0400 |
V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2023-1901 |
The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer. Published: July 10, 2023; 12:15:49 PM -0400 |
V3.1: 8.0 HIGH V2.0:(not available) |
CVE-2023-21202 |
In btm_delete_stored_link_key_complete of btm_devctl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over Bluetooth with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568359 Published: June 28, 2023; 2:15:15 PM -0400 |
V3.1: 4.5 MEDIUM V2.0:(not available) |
CVE-2023-21196 |
In btm_ble_batchscan_filter_track_adv_vse_cback of btm_ble_batchscan.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-261857395 Published: June 28, 2023; 2:15:15 PM -0400 |
V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2023-21195 |
In btm_ble_periodic_adv_sync_tx_rcvd of btm_ble_gap.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth, if the firmware were compromised with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-233879420 Published: June 28, 2023; 2:15:15 PM -0400 |
V3.1: 4.5 MEDIUM V2.0:(not available) |
CVE-2023-21194 |
In gatt_dbg_op_name of gatt_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260079141 Published: June 28, 2023; 2:15:15 PM -0400 |
V3.1: 4.4 MEDIUM V2.0:(not available) |
CVE-2023-27964 |
An authentication issue was addressed with improved state management. This issue is fixed in AirPods Firmware Update 5E133. When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones. Published: June 23, 2023; 2:15:11 PM -0400 |
V3.1: 5.4 MEDIUM V2.0:(not available) |
CVE-2023-2683 |
A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error. Published: June 15, 2023; 4:15:09 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-21108 |
In sdpu_build_uuid_seq of sdp_discovery.cc, there is a possible out of bounds write due to a use after free. This could lead to remote code execution over Bluetooth, if HFP support is enabled, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-239414876 Published: June 15, 2023; 3:15:09 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-20724 |
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07843845; Issue ID: ALPS07843841. Published: June 06, 2023; 9:15:11 AM -0400 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2023-20723 |
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07843845; Issue ID: ALPS07843845. Published: June 06, 2023; 9:15:11 AM -0400 |
V3.1: 6.7 MEDIUM V2.0:(not available) |
CVE-2022-24695 |
Bluetooth Classic in Bluetooth Core Specification through 5.3 does not properly conceal device information for Bluetooth transceivers in Non-Discoverable mode. By conducting an efficient over-the-air attack, an attacker can fully extract the permanent, unique Bluetooth MAC identifier, along with device capabilities and identifiers, some of which may contain identifying information about the device owner. This additionally allows the attacker to establish a connection to the target device. Published: June 02, 2023; 8:15:09 AM -0400 |
V3.1: 4.3 MEDIUM V2.0:(not available) |
CVE-2023-28704 |
Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service. Published: June 02, 2023; 7:15:10 AM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-2002 |
A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. Published: May 26, 2023; 1:15:14 PM -0400 |
V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2023-24948 |
Windows Bluetooth Driver Elevation of Privilege Vulnerability Published: May 09, 2023; 2:15:13 PM -0400 |
V3.1: 7.4 HIGH V2.0:(not available) |
CVE-2023-24947 |
Windows Bluetooth Driver Remote Code Execution Vulnerability Published: May 09, 2023; 2:15:12 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-24944 |
Windows Bluetooth Driver Information Disclosure Vulnerability Published: May 09, 2023; 2:15:12 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-38685 |
In bluetooth service, there is a possible missing permission check. This could lead to local denial of service in bluetooth service with no additional execution privileges needed. Published: May 08, 2023; 10:15:08 PM -0400 |
V3.1: 5.5 MEDIUM V2.0:(not available) |
CVE-2023-23528 |
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 16.4, iOS 16.4 and iPadOS 16.4. Processing a maliciously crafted Bluetooth packet may result in disclosure of process memory. Published: May 08, 2023; 4:15:16 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-20870 |
VMware Workstation and Fusion contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. Published: April 25, 2023; 6:15:09 PM -0400 |
V3.1: 6.0 MEDIUM V2.0:(not available) |