First published: Wed Feb 12 2020(Updated: )
The Bluetooth Low Energy implementation on NXP SDK through 2.2.1 for KW41Z devices does not properly restrict the Link Layer payload length, allowing attackers in radio range to cause a buffer overflow via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nxp Mcuxpresso Software Development Kit | <=2.2.1 | |
Nxp Kw31z | ||
Nxp Kw34 | ||
Nxp Kw35 | ||
Nxp Kw36 | ||
Nxp Kw37 | ||
Nxp Kw38 | ||
Nxp Kw39 | ||
NXP KW41Z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-17519.
The severity of CVE-2019-17519 is high (8.8).
NXP SDK through 2.2.1 for KW41Z devices is affected by CVE-2019-17519.
An attacker in radio range can cause a buffer overflow by sending a crafted packet that exceeds the Link Layer payload length.
No, NXP KW41Z is not vulnerable to CVE-2019-17519.