First published: Tue Sep 07 2021(Updated: )
The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zh-jieli Fw-ac63 Bt Sdk | <=0.9.1 | |
Zh-jieli Ac6936 | ||
Zh-jieli Ac6951 | ||
Zh-jieli Ac6952 | ||
Zh-jieli Ac6954 | ||
Zh-jieli Ac6955 | ||
Zh-jieli Ac6956 | ||
Zh-jieli Ac6963 | ||
Zh-jieli Ac6965 | ||
Zh-jieli Ac6966 | ||
Zh-jieli Ac6969 | ||
Zh-jieli Ac6973 | ||
Zh-jieli Ac6976 | ||
Zh-jieli Ac6983 | ||
Zh-jieli Ac6986 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34144 is a vulnerability in the Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1.
CVE-2021-34144 allows attackers in radio range to prevent new BT connections in the Zhuhai Jieli AC6366C BT SDK through 0.9.1.
CVE-2021-34144 has a severity rating of 6.5 (Medium).
There is currently no known fix or patch available for CVE-2021-34144. It is recommended to follow the vendor's guidance and stay updated with the latest security advisories.
You can find more information about CVE-2021-34144 on the following references: [Packet Storm Security](https://dl.packetstormsecurity.net/papers/general/braktooth.pdf), [GitHub fw-AC63_BT_SDK](https://github.com/Jieli-Tech/fw-AC63_BT_SDK), and [Bluetooth Listing Details](https://launchstudio.bluetooth.com/ListingDetails/91371).