6.5
CVSSv3

CVE-2021-34144

Published: 07/09/2021 Updated: 09/09/2021
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 295
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK up to and including 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zh-jieli fw-ac63_bt_sdk