First published: Mon Feb 10 2020(Updated: )
The Bluetooth Low Energy implementation on Microchip Technology BluSDK Smart through 6.2 for ATSAMB11 devices does not properly restrict link-layer data length on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microchip Atmsamb11 Blusdk Smart | <=6.2 | |
Microchip Atsamb11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19195 is a vulnerability in the Bluetooth Low Energy implementation on Microchip Technology BluSDK Smart through 6.2 for ATSAMB11 devices.
CVE-2019-19195 allows attackers in radio range to cause a denial of service (crash) via a crafted packet.
The severity of CVE-2019-19195 is medium with a CVSS score of 6.5.
To fix CVE-2019-19195, it is recommended to update to a patched version of Microchip Technology BluSDK Smart.
You can find more information about CVE-2019-19195 at the following references: [Link1](https://asset-group.github.io/disclosures/sweyntooth/) and [Link2](https://www.microchip.com/wwwproducts/en/ATSAMB11).