
16/10/2024

16/10/2024
CVE-2024-29155: Denial of service on Microchip RN4870 devices
First published: Wed Oct 16 2024(Updated: )
On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is
received, the device becomes incapable of completing the pairing
process. A third party can inject a second PairReqNoInputNoOutput request
just after a real one, causing the pair request to be blocked.
Credit: dc3f6da9-85b5-4a73-84a2-2ec90b40fca5
Affected Software | Affected Version | How to fix |
---|
Microchip RN4870 Firmware | | |
Remedy
Update to firmware version 1.44 or higher.
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-29155?
The severity of CVE-2024-29155 is rated as high due to the potential for an attacker to disrupt the pairing process of affected Microchip RN4870 devices.
How do I fix CVE-2024-29155?
To fix CVE-2024-29155, users should update the firmware of their Microchip RN4870 devices to the latest version available from Microchip.
Which devices are affected by CVE-2024-29155?
CVE-2024-29155 specifically affects Microchip RN4870 devices that handle PairReqNoInputNoOutput requests.
What impact does CVE-2024-29155 have on device functionality?
CVE-2024-29155 can prevent the RN4870 device from completing the pairing process, potentially causing communication failures.
Is there any workaround for CVE-2024-29155?
Currently, there are no documented workarounds for CVE-2024-29155, making firmware updates the primary mitigation.
- agent/weakness
- agent/remedy
- agent/title
- agent/references
- agent/type
- agent/description
- agent/first-publish-date
- agent/severity
- agent/author
- agent/event
- collector/nvd-api
- source/NVD
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/source
- agent/softwarecombine
- agent/tags
- agent/guess-ai
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/microchip
- canonical/microchip rn4870 firmware
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203