The function responsible for handling BLE connection responses does not verify whether a response is expected—that is, whether the device has initiated a connection request. Instead, it relies solely on identifier matching.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 19 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 19 Sep 2025 06:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The function responsible for handling BLE connection responses, fails to verify whether a connection response is actually expected—i.e., whether the device initiated a connection request. Instead, it only checks if the identifier matches | The function responsible for handling BLE connection responses does not verify whether a response is expected—that is, whether the device has initiated a connection request. Instead, it relies solely on identifier matching. |
Fri, 19 Sep 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The function responsible for handling BLE connection responses, fails to verify whether a connection response is actually expected—i.e., whether the device initiated a connection request. Instead, it only checks if the identifier matches | |
Title | Bluetooth: Out-Of-Context le_conn_rsp Handling | |
Weaknesses | CWE-358 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2025-09-19T13:09:35.846Z
Reserved: 2025-09-15T05:11:21.445Z
Link: CVE-2025-10457

Updated: 2025-09-19T13:09:32.411Z

Status : Received
Published: 2025-09-19T06:15:34.590
Modified: 2025-09-19T06:15:34.590
Link: CVE-2025-10457

No data.

No data.