The Bluetooth Classic implementation on Actions ATS2815 and ATS2819 chipsets does not properly handle the reception of multiple LMP_host_connection_req packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device via crafted LMP packets. Manual user intervention is required to restart the device and restore Bluetooth communication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
actions-semi ats2819p_firmware - |
||
actions-semi ats2815_firmware - |
||
actions-semi ats2819_firmware - |
||
actions-semi ats2819s_firmware - |
||
actions-semi ats2819t_firmware - |