First published: Tue Sep 07 2021(Updated: )
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zh-jieli Fw-ac63 Bt Sdk | =1.0.0 | |
Zh-jieli Ac6936 | ||
Zh-jieli Ac6951 | ||
Zh-jieli Ac6952 | ||
Zh-jieli Ac6954 | ||
Zh-jieli Ac6955 | ||
Zh-jieli Ac6956 | ||
Zh-jieli Ac6963 | ||
Zh-jieli Ac6965 | ||
Zh-jieli Ac6966 | ||
Zh-jieli Ac6969 | ||
Zh-jieli Ac6973 | ||
Zh-jieli Ac6976 | ||
Zh-jieli Ac6983 | ||
Zh-jieli Ac6986 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34143 is a vulnerability in the Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0.
CVE-2021-34143 allows attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets.
CVE-2021-34143 has a severity value of 6.5 (out of 10).
There is no available fix for CVE-2021-34143 at the moment, it is recommended to follow the suggestions provided by the vendor or the Bluetooth SIG.
You can find more information about CVE-2021-34143 in the following references: [Reference 1](https://dl.packetstormsecurity.net/papers/general/braktooth.pdf), [Reference 2](https://github.com/Jieli-Tech/fw-AC63_BT_SDK), [Reference 3](https://launchstudio.bluetooth.com/ListingDetails/91371).