The Bluetooth Classic implementation on Actions ATS2815 chipsets does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and shutdown of a device by flooding the target device with LMP_features_res packets.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
actions-semi ats2819p_firmware - |
||
actions-semi ats2815_firmware - |
||
actions-semi ats2819_firmware - |
||
actions-semi ats2819s_firmware - |
||
actions-semi ats2819t_firmware - |