CVE-2023-0779
- EPSS 0.21%
- Veröffentlicht 30.05.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 07:37:48
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
CVE-2021-3329
- EPSS 0.06%
- Veröffentlicht 26.02.2023 07:15:10
- Zuletzt bearbeitet 21.11.2024 06:21:18
Lack of proper validation in HCI Host stack initialization can cause a crash of the bluetooth stack
CVE-2023-0396
- EPSS 0.06%
- Veröffentlicht 25.01.2023 02:02:06
- Zuletzt bearbeitet 03.04.2025 20:15:20
A malicious / defective bluetooth controller can cause buffer overreads in the most functions that process HCI command responses.
CVE-2022-3806
- EPSS 0.13%
- Veröffentlicht 25.01.2023 02:01:19
- Zuletzt bearbeitet 03.04.2025 20:15:17
Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.
CVE-2023-0397
- EPSS 0.04%
- Veröffentlicht 19.01.2023 06:15:09
- Zuletzt bearbeitet 21.11.2024 07:37:06
A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete.
CVE-2021-3966
- EPSS 0.07%
- Veröffentlicht 11.01.2023 05:15:10
- Zuletzt bearbeitet 21.11.2024 06:23:15
usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.
CVE-2022-0553
- EPSS 0.02%
- Veröffentlicht 11.01.2023 04:15:10
- Zuletzt bearbeitet 21.11.2024 06:38:54
There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily.
CVE-2022-2993
- EPSS 0.45%
- Veröffentlicht 09.12.2022 20:15:10
- Zuletzt bearbeitet 22.04.2025 18:15:49
There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.
CVE-2022-2741
- EPSS 0.32%
- Veröffentlicht 31.10.2022 18:15:13
- Zuletzt bearbeitet 21.11.2024 07:01:37
The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on...
CVE-2022-1841
- EPSS 0.23%
- Veröffentlicht 31.08.2022 20:15:08
- Zuletzt bearbeitet 21.11.2024 06:41:35
In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero.