6.5

CVE-2019-19196

Exploit
The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices accepts a pairing request with a key size greater than 16 bytes, allowing an attacker in radio range to cause a buffer overflow and denial of service (crash) via crafted packets.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Telink-semiTlsr8258 Ble Sdk Version <= 3.4.0
   Telink-semiTlsr8258 Version-
Telink-semiTlsr8269 Ble Sdk Version <= 3.3
   Telink-semiTlsr8269 Version-
Telink-semiTlsr8253 Ble Sdk Version <= 3.4.0
   Telink-semiTlsr8253 Version-
Telink-semiTlsr8251 Ble Sdk Version <= 3.4.0
   Telink-semiTlsr8251 Version-
Telink-semiTlsr8232 Ble Sdk Version <= 1.3.0
   Telink-semiTlsr8232 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.14% 0.35
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:N/I:N/A:P
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.