First published: Mon Feb 10 2020(Updated: )
The Bluetooth Low Energy (BLE) stack implementation on the NXP KW41Z (based on the MCUXpresso SDK with Bluetooth Low Energy Driver 2.2.1 and earlier) does not properly restrict the BLE Link Layer header and executes certain memory contents upon receiving a packet with a Link Layer ID (LLID) equal to zero. This allows attackers within radio range to cause deadlocks, cause anomalous behavior in the BLE state machine, or trigger a buffer overflow via a crafted BLE Link Layer frame.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nxp Mcuxpresso Software Development Kit | <=2.2.1 | |
Nxp Kw31z | ||
Nxp Kw34 | ||
Nxp Kw35 | ||
Nxp Kw36 | ||
Nxp Kw37 | ||
Nxp Kw38 | ||
Nxp Kw39 | ||
NXP KW41Z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17060 is a vulnerability in the Bluetooth Low Energy (BLE) stack implementation on the NXP KW41Z.
CVE-2019-17060 has a severity value of 6.5, which is considered medium.
The NXP MCUXpresso Software Development Kit versions up to 2.2.1 are affected by CVE-2019-17060.
To fix CVE-2019-17060, users should update to a version of the NXP MCUXpresso Software Development Kit that is not vulnerable.
You can find more information about CVE-2019-17060 on the following websites: [Official NXP Product Page](https://www.nxp.com/products/wireless/bluetooth-low-energy:BLUETOOTH-LOW-ENERGY-BLE), [Release Notes and Disclosure](https://asset-group.github.io/disclosures/sweyntooth/)