The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-20806 The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T00:05:52.439Z

Reserved: 2021-06-07T00:00:00

Link: CVE-2021-34144

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-07T06:15:07.867

Modified: 2024-11-21T06:09:56.747

Link: CVE-2021-34144

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses