// For flags

CVE-2019-13916

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Cypress (formerly Broadcom) WICED Studio 6.2 CYW20735B1 and CYW20819A1. As a Bluetooth Low Energy (BLE) packet is received, it is copied into a Heap (ThreadX Block) buffer. The buffer allocated in dhmulp_getRxBuffer is four bytes too small to hold the maximum of 255 bytes plus headers. It is possible to corrupt a pointer in the linked list holding the free buffers of the g_mm_BLEDeviceToHostPool Block pool. This pointer can be fully controlled by overflowing with 3 bytes of packet data and the first byte of the packet CRC checksum. The checksum can be freely chosen by adapting the packet data accordingly. An attacker might be able to allocate the overwritten address as a receive buffer resulting in a write-what-where condition. This is fixed in BT SDK2.4 and BT SDK2.45.

Se detectó un problema en Cypress (anteriormente Broadcom) WICED Studio versión 6.2 CYW20735B1 y CYW20819A1. Cuando un paquete Bluetooth Low Energy (BLE) es recibido, es copiado en un búfer Heap (ThreadX Block). El búfer asignado en dhmulp_getRxBuffer es cuatro bytes mas pequeño para contener el máximo de 255 bytes más encabezados. Es posible corromper un puntero en la lista vinculada contenedora de los búferes libres del grupo Block g_mm_BLEDeviceToHostPool. Este puntero puede ser controlado completamente al desbordar con 3 bytes del paquete de datos y el primer byte de la suma de comprobaciones CRC del paquete. La suma de comprobaciones puede ser elegida libremente al adaptar los datos del paquete en consecuencia. Un atacante podría ser capaz de asignar la dirección sobrescrita como un búfer de recepción, resultando en una condición write-what-where. Esto se corrigió en BT SDK2.4 y BT SDK2.45.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-18 CVE Reserved
  • 2020-04-13 CVE Published
  • 2023-08-17 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cypress
Search vendor "Cypress"
Wiced Studio
Search vendor "Cypress" for product "Wiced Studio"
6.2
Search vendor "Cypress" for product "Wiced Studio" and version "6.2"
-
Affected
in Cypress
Search vendor "Cypress"
Cyw20735b1
Search vendor "Cypress" for product "Cyw20735b1"
--
Safe
Cypress
Search vendor "Cypress"
Wiced Studio
Search vendor "Cypress" for product "Wiced Studio"
6.2
Search vendor "Cypress" for product "Wiced Studio" and version "6.2"
-
Affected
in Cypress
Search vendor "Cypress"
Cyw20819a1
Search vendor "Cypress" for product "Cyw20819a1"
--
Safe