First published: Tue Sep 07 2021(Updated: )
The Bluetooth Classic implementation on Zhuhai Jieli AC690X and AC692X devices does not properly handle the reception of a truncated LMP packet during the LMP auto rate procedure, allowing attackers in radio range to immediately crash (and restart) a device via a crafted LMP packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zh-jieli Ac6901 Firmware | ||
Zh-jieli Ac6901 | ||
Zh-jieli Ac6925 Firmware | ||
Zh-jieli Ac6925 | ||
Zh-jieli Ac6926 Firmware | ||
Zh-jieli Ac6926 | ||
Zh-jieli Ac6928 Firmware | ||
Zh-jieli Ac6928 | ||
Zh-jieli Ac6921 Firmware | ||
Zh-jieli Ac6921 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-31613.
The severity of CVE-2021-31613 is medium with a severity value of 6.5.
The Zhuhai Jieli AC690X firmware is affected by CVE-2021-31613.
The Zhuhai Jieli AC692X firmware is affected by CVE-2021-31613.
There is no known fix or patch available for CVE-2021-31613 at the moment. It is recommended to follow the mitigation steps provided by the vendor.