First published: Tue Sep 07 2021(Updated: )
The Bluetooth Classic implementation on AB32VG1 devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (either restart or deadlock the device) by flooding a device with LMP_AU_rand data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mi Mi True Wireless Earbuds Basic 2 Firmware | ||
Mi Mi True Wireless Earbuds Basic 2 | ||
Bluetrum Ab5376t Firmware | ||
Bluetrum Ab5376t | ||
Bluetrum Bt8896a Firmware | ||
Bluetrum Bt8896a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31610 is a vulnerability in the Bluetooth Classic implementation on AB32VG1 devices, which allows attackers in radio range to trigger a denial of service by flooding the device with LMP_AU_rand data.
CVE-2021-31610 can result in a denial of service on affected devices, either by causing a restart or deadlock of the device.
Devices affected by CVE-2021-31610 include Mi Mi True Wireless Earbuds Basic 2 Firmware and Bluetrum Ab5376t Firmware.
CVE-2021-31610 has a severity of medium, with a severity value of 6.5.
To mitigate CVE-2021-31610, it is recommended to update to the latest firmware provided by the device manufacturer.