First published: Fri Jun 11 2021(Updated: )
Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.
Credit: mobile.security@samsung.com
Affected Software | Affected Version | How to fix |
---|---|---|
<5.5 | ||
<5.5 | ||
Samsung Galaxy Watch Firmware | <5.5 | |
Samsung Galaxy Watch | ||
Samsung Galaxy Watch 3 Firmware | <5.5 | |
Samsung Galaxy Watch 3 | ||
Samsung Gear S3 Firmware | <5.5 | |
Samsung Gear S3 | ||
Samsung Gear S2 Firmware | <5.5 | |
Samsung Gear S2 | ||
Samsung Gear S Firmware | <5.5 | |
Samsung Gear S | ||
Samsung Gear 2 Firmware | <5.5 | |
Samsung Gear 2 | ||
Samsung Gear 2 Neo Firmware | <5.5 | |
Samsung Gear 2 Neo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-25424.
The severity of CVE-2021-25424 is high with a CVSS score of 8.8.
Devices such as Samsung Galaxy Watch, Samsung Gear S3, Samsung Gear S2, and Samsung Gear 2 are affected by CVE-2021-25424.
An attacker can exploit CVE-2021-25424 by using a bluetooth attack to take over a user's bluetooth device without their awareness.
Yes, a firmware update was released in June 2021 to fix CVE-2021-25424. It is recommended to update to the latest firmware version to mitigate this vulnerability.