6.5

CVE-2021-31785

The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user intervention is required to restart the device and restore Bluetooth communication.

Data is provided by the National Vulnerability Database (NVD)
Actions-semiAts2819p Firmware Version-
   Actions-semiAts2819p Version-
Actions-semiAts2815 Firmware Version-
   Actions-semiAts2815 Version-
Actions-semiAts2819 Firmware Version-
   Actions-semiAts2819 Version-
Actions-semiAts2819s Firmware Version-
   Actions-semiAts2819s Version-
Actions-semiAts2819t Firmware Version-
   Actions-semiAts2819t Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.254
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 6.1 6.5 6.9
AV:A/AC:L/Au:N/C:N/I:N/A:C
CWE-667 Improper Locking

The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.