6.5

CVE-2021-34143

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0 does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after paging procedure. User intervention is required to restart the device.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zh-jieliFw-ac63 Bt Sdk Version1.0.0
   Zh-jieliAc6936 Version-
   Zh-jieliAc6951 Version-
   Zh-jieliAc6952 Version-
   Zh-jieliAc6954 Version-
   Zh-jieliAc6955 Version-
   Zh-jieliAc6956 Version-
   Zh-jieliAc6963 Version-
   Zh-jieliAc6965 Version-
   Zh-jieliAc6966 Version-
   Zh-jieliAc6969 Version-
   Zh-jieliAc6973 Version-
   Zh-jieliAc6976 Version-
   Zh-jieliAc6983 Version-
   Zh-jieliAc6986 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.24% 0.473
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 6.1 6.5 6.9
AV:A/AC:L/Au:N/C:N/I:N/A:C