CVE-2021-34146
https://notcve.org/view.php?id=CVE-2021-34146
The Bluetooth Classic implementation in the Cypress CYW920735Q60EVB does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and restart (crash) of the device by flooding it with LMP_AU_Rand packets after the paging procedure. Una implementación de Bluetooth Classic en el Cypress CYW920735Q60EVB no maneja apropiadamente la recepción de respuestas LMP continuas no solicitadas, permitiendo a atacantes en el rango de radio desencadenar una denegación de servicio y reinicio (crash) del dispositivo al inundarlo con paquetes LMP_AU_Rand después del procedimiento de paginación • https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://www.cypress.com/documentation/datasheets/cyw20735b1-single-chip-bluetooth-transceiver-wireless-input-devices •
CVE-2021-34147
https://notcve.org/view.php?id=CVE-2021-34147
The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 does not properly handle the reception of a malformed LMP timing accuracy response followed by multiple reconnections to the link slave, allowing attackers to exhaust device BT resources and eventually trigger a crash via multiple attempts of sending a crafted LMP timing accuracy response followed by a sudden reconnection with a random BDAddress. Una implementación de Bluetooth Classic en la pila BT de Cypress WICED versiones hasta 2.9.0 para CYW20735B1, no maneja apropiadamente la recepción de una respuesta de precisión de tiempo LMP malformada seguida de múltiples reconexiones al esclavo de enlace, permitiendo a atacantes agotar los recursos BT del dispositivo y, finalmente, desencadenar un fallo por medio de múltiples intentos de envío de una respuesta de precisión de tiempo LMP diseñada seguida de una reconexión repentina con una dirección BDA aleatoria • https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://www.cypress.com/documentation/datasheets/cyw20735b1-single-chip-bluetooth-transceiver-wireless-input-devices •
CVE-2021-34148
https://notcve.org/view.php?id=CVE-2021-34148
The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with a greater ACL Length after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service (firmware crash) via a crafted LMP packet. Una implementación de Bluetooth Classic en la pila WICED BT de Cypress versiones hasta 2.9.0 para los dispositivos CYW20735B1, no maneja apropiadamente la recepción de LMP_max_slot con una longitud ACL mayor después de completar el procedimiento de configuración de LMP, permitiendo a atacantes en el rango de radio desencadenar una denegación de servicio (bloqueo del firmware) por medio de un paquete LMP diseñado • https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://www.cypress.com/documentation/datasheets/cyw20735b1-single-chip-bluetooth-transceiver-wireless-input-devices •
CVE-2021-34145
https://notcve.org/view.php?id=CVE-2021-34145
The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with an invalid Baseband packet type (and LT_ADDRESS and LT_ADDR) after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service (firmware crash) via a crafted LMP packet. Una implementación de Bluetooth Classic en la pila WICED BT de Cypress versiones hasta 2.9.0, para los dispositivos CYW20735B1 no maneja apropiadamente la recepción de LMP_max_slot con un tipo de paquete de banda base no válido (y LT_ADDRESS y LT_ADDR) tras la finalización del procedimiento de configuración de LMP, permitiendo a atacantes en el rango de radio desencadenar una denegación de servicio (bloqueo del firmware) por medio de un paquete LMP diseñado • https://dl.packetstormsecurity.net/papers/general/braktooth.pdf https://www.cypress.com/documentation/datasheets/cyw20735b1-single-chip-bluetooth-transceiver-wireless-input-devices •
CVE-2019-18614
https://notcve.org/view.php?id=CVE-2019-18614
On the Cypress CYW20735 evaluation board, any data that exceeds 384 bytes is copied and causes an overflow. This is because the maximum BLOC buffer size for sending and receiving data is set to 384 bytes, but everything else is still configured to the usual size of 1092 (which was used for everything in the previous CYW20719 and later CYW20819 evaluation board). To trigger the overflow, an attacker can either send packets over the air or as unprivileged local user. Over the air, the minimal PoC is sending "l2ping -s 600" to the target address prior to any pairing. Locally, the buffer overflow is immediately triggered by opening an ACL or SCO connection to a headset. • https://github.com/seemoo-lab/frankenstein/blob/master/doc/CVE_2019_18614.md • CWE-787: Out-of-bounds Write •