mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
21 lines
1.1 KiB
Markdown
21 lines
1.1 KiB
Markdown
### [CVE-2021-31786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31786)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The Bluetooth Classic Audio implementation on Actions ATS2815 and ATS2819 devices does not properly handle a connection attempt from a host with the same BDAddress as the current connected BT host, allowing attackers to trigger a disconnection and deadlock of the device by connecting with a forged BDAddress that matches the original connected host.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
|
|
#### Github
|
|
- https://github.com/CerberusMrX/Advanced-Bluetooth-Penetration-Testing-Tool
|
|
- https://github.com/JeffroMF/awesome-bluetooth-security321
|
|
- https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks
|
|
- https://github.com/engn33r/awesome-bluetooth-security
|
|
|