CVE-2021-34143

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0 does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after paging procedure. User intervention is required to restart the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:1.0.0:*:*:*:*:*:*:*
OR cpe:2.3:h:zh-jieli:ac6936:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6951:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6952:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6954:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6955:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6956:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6963:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6965:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6966:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6969:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6973:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6976:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6983:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6986:-:*:*:*:*:*:*:*

History

14 Sep 2021, 13:57

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:h:zh-jieli:ac6963:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6986:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6954:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6936:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6976:-:*:*:*:*:*:*:*
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:1.0.0:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6955:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6966:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6956:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6951:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6973:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6965:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6983:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6969:-:*:*:*:*:*:*:*
cpe:2.3:h:zh-jieli:ac6952:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.1
v3 : 6.5
References (MISC) https://launchstudio.bluetooth.com/ListingDetails/91371 - (MISC) https://launchstudio.bluetooth.com/ListingDetails/91371 - Third Party Advisory
References (MISC) https://github.com/Jieli-Tech/fw-AC63_BT_SDK - (MISC) https://github.com/Jieli-Tech/fw-AC63_BT_SDK - Third Party Advisory
References (MISC) https://dl.packetstormsecurity.net/papers/general/braktooth.pdf - (MISC) https://dl.packetstormsecurity.net/papers/general/braktooth.pdf - Broken Link

07 Sep 2021, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-07 07:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-34143

Mitre link : CVE-2021-34143

CVE.ORG link : CVE-2021-34143


JSON object : View

Products Affected

zh-jieli

  • fw-ac63_bt_sdk
  • ac6951
  • ac6976
  • ac6936
  • ac6986
  • ac6969
  • ac6983
  • ac6952
  • ac6965
  • ac6963
  • ac6955
  • ac6956
  • ac6973
  • ac6966
  • ac6954