6.5

CVE-2021-34144

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

Data is provided by the National Vulnerability Database (NVD)
Zh-jieliFw-ac63 Bt Sdk Version <= 0.9.1
   Zh-jieliAc6936 Version-
   Zh-jieliAc6951 Version-
   Zh-jieliAc6952 Version-
   Zh-jieliAc6954 Version-
   Zh-jieliAc6955 Version-
   Zh-jieliAc6956 Version-
   Zh-jieliAc6963 Version-
   Zh-jieliAc6965 Version-
   Zh-jieliAc6966 Version-
   Zh-jieliAc6969 Version-
   Zh-jieliAc6973 Version-
   Zh-jieliAc6976 Version-
   Zh-jieliAc6983 Version-
   Zh-jieliAc6986 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.303
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:N/I:N/A:P