The Bluetooth Classic Audio implementation on Actions ATS2815 and ATS2819 devices does not properly handle a connection attempt from a host with the same BDAddress as the current connected BT host, allowing malicious users to trigger a disconnection and deadlock of the device by connecting with a forged BDAddress that matches the original connected host.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
actions-semi ats2819p_firmware - |
||
actions-semi ats2815_firmware - |
||
actions-semi ats2819_firmware - |
||
actions-semi ats2819s_firmware - |
||
actions-semi ats2819t_firmware - |