mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
240 lines
6.9 KiB
JSON
240 lines
6.9 KiB
JSON
{
|
|
"id": "CVE-2021-31785",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-09-07T07:15:07.143",
|
|
"lastModified": "2022-05-03T16:04:40.443",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user intervention is required to restart the device and restore Bluetooth communication."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una implementaci\u00f3n de Bluetooth Classic en los conjuntos de chips Actions ATS2815 y ATS2819, no maneja apropiadamente la recepci\u00f3n de m\u00faltiples paquetes LMP_host_connection_req, permitiendo a atacantes en el rango de radio desencadenar una denegaci\u00f3n de servicio (bloqueo) del dispositivo por medio de paquetes LMP dise\u00f1ados. Es requerida una intervenci\u00f3n manual del usuario para reiniciar el dispositivo y restaurar la comunicaci\u00f3n Bluetooth"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
|
|
"accessVector": "ADJACENT_NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 6.1
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 6.5,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-667"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:actions-semi:ats2819p_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B034D11B-2F14-4283-8E99-27A9D7381CCE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:actions-semi:ats2819p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A4590A4D-CA4A-467B-9A0C-DDBAF32576D4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:actions-semi:ats2815_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F959F1E4-A733-4454-8FC0-4A567946E582"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:actions-semi:ats2815:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "23646581-74EE-4C65-8BC8-D248C9A481F8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:actions-semi:ats2819_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9293F654-73A6-4307-9610-91CFCB3B896D"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:actions-semi:ats2819:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E76B147-A1D1-4160-B87D-31DD5F9DFF1B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:actions-semi:ats2819s_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4935084A-87E2-4041-8108-37407D888798"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:actions-semi:ats2819s:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F918DD8-1070-44F5-A167-1D151430A89A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:actions-semi:ats2819t_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7243C2D0-67F2-4EC1-8A52-7540C3117293"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:actions-semi:ats2819t:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36CB59B4-95EB-487C-86EB-E8657D1C2286"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://dl.packetstormsecurity.net/papers/general/braktooth.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Technical Description",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://launchstudio.bluetooth.com/ListingDetails/76427",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.actions-semi.com/index.php?id=3581&siteId=4",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Broken Link",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |