CVE-2021-31610

The Bluetooth Classic implementation on AB32VG1 devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (either restart or deadlock the device) by flooding a device with LMP_AU_rand data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:mi:mi_true_wireless_earbuds_basic_2:-:*:*:*:*:*:*:*
cpe:2.3:o:mi:mi_true_wireless_earbuds_basic_2_firmware:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:h:bluetrum:ab5376t:-:*:*:*:*:*:*:*
cpe:2.3:o:bluetrum:ab5376t_firmware:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:h:bluetrum:bt8896a:-:*:*:*:*:*:*:*
cpe:2.3:o:bluetrum:bt8896a_firmware:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-09-07 07:15

Updated : 2021-09-13 17:44


NVD link : CVE-2021-31610

Mitre link : CVE-2021-31610

CVE.ORG link : CVE-2021-31610


JSON object : View

Products Affected

bluetrum

  • bt8896a
  • ab5376t
  • bt8896a_firmware
  • ab5376t_firmware

mi

  • mi_true_wireless_earbuds_basic_2_firmware
  • mi_true_wireless_earbuds_basic_2