First published: Tue Aug 30 2022(Updated: )
Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packets’ reference parameter. An unauthenticated attacker in the adjacent network can exploit this vulnerability to cause buffer overflow and disrupt service.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Realtek Bluetooth Mesh Software Development Kit | <=4.17-4.17-20220127 | |
Google Android | ||
Linux Linux kernel |
Realtek Linux/Android Bluetooth Mesh SDK v4.18-4.18-20220218
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-26527.
The title of the vulnerability is "Realtek Linux/Android Bluetooth Mesh SDK has a buffer overflow vulnerability due to insufficient validation for the size of segmented packets’ reference parameter."
The severity of CVE-2022-26527 is medium with a severity value of 6.5.
CVE-2022-26527 affects the Realtek Bluetooth Mesh Software Development Kit version 4.17-4.17-20220127.
An unauthenticated attacker in the adjacent network can exploit CVE-2022-26527 to cause buffer overflow and disrupt service.
You can find more information about CVE-2022-26527 at the following link: [https://www.twcert.org.tw/tw/cp-132-6457-66bc9-1.html](https://www.twcert.org.tw/tw/cp-132-6457-66bc9-1.html)