First published: Wed Nov 13 2019(Updated: )
Texas Instruments CC256x and WL18xx dual-mode Bluetooth controller devices, when LE scan mode is used, allow remote attackers to trigger a buffer overflow via a malformed Bluetooth Low Energy advertising packet, to cause a denial of service or potentially execute arbitrary code. This affects CC256xC-BT-SP 1.2, CC256xB-BT-SP 1.8, and WL18xx-BT-SP 4.4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ti Cc256xc-bt-sp Firmware | <=1.2 | |
Ti Cc256xc-bt-sp | ||
Ti Cc256xb-bt-sp Firmware | <=1.8 | |
Ti Cc256xb-bt-sp | ||
Ti Wl18xx-bt-sp Firmware | <=4.4 | |
Ti Wl18xx-bt-sp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15948 is a vulnerability that affects Texas Instruments CC256x and WL18xx dual-mode Bluetooth controller devices.
CVE-2019-15948 allows remote attackers to trigger a buffer overflow via a malformed Bluetooth Low Energy advertising packet, potentially causing a denial of service or executing arbitrary code.
The severity of CVE-2019-15948 is rated high, with a CVSS score of 8.8.
The CC256xC BT SP Firmware version up to 1.2, CC256xB BT SP Firmware version up to 1.8, and WL18xx BT SP Firmware version up to 4.4 are affected by CVE-2019-15948.
To mitigate CVE-2019-15948, it is recommended to apply the necessary updates provided by Texas Instruments and follow their security recommendations.