First published: Tue Sep 07 2021(Updated: )
The Bluetooth Classic implementation in the Cypress CYW920735Q60EVB does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and restart (crash) of the device by flooding it with LMP_AU_Rand packets after the paging procedure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cypress Cyw920735q60evb-01 Firmware | ||
Cypress Cyw920735q60evb-01 | ||
Cypress Cyw20735b1 Firmware | ||
Cypress Cyw20735b1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-34146 is medium with a severity score of 6.5.
The affected software of CVE-2021-34146 includes Cypress Cyw920735q60evb-01 Firmware and Cypress Cyw20735b1 Firmware.
CVE-2021-34146 allows attackers in radio range to trigger a denial of service and restart (crash) of the Cypress CYW920735Q60EVB device by flooding it with LMP_AU_Rand packets.
No, Cypress Cyw20735b1 is not vulnerable to CVE-2021-34146.
You can find more information about CVE-2021-34146 in the following references: [link1](https://dl.packetstormsecurity.net/papers/general/braktooth.pdf) and [link2](https://www.cypress.com/documentation/datasheets/cyw20735b1-single-chip-bluetooth-transceiver-wireless-input-devices).