First published: Mon Feb 19 2024(Updated: )
The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <=3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1638 is classified as a medium severity vulnerability.
To fix CVE-2024-1638, upgrade to a version of Zephyr Project Manager that is higher than 3.5.0.
CVE-2024-1638 affects versions of the Zephyr Project up to and including 3.5.0.
CVE-2024-1638 involves improper handling of attribute read/write permissions for Bluetooth characteristics using LE Secure Connections.
Yes, CVE-2024-1638 specifically concerns security implications in Bluetooth characteristic permissions.