CVE-2019-15948
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Texas Instruments CC256x and WL18xx dual-mode Bluetooth controller devices, when LE scan mode is used, allow remote attackers to trigger a buffer overflow via a malformed Bluetooth Low Energy advertising packet, to cause a denial of service or potentially execute arbitrary code. This affects CC256xC-BT-SP 1.2, CC256xB-BT-SP 1.8, and WL18xx-BT-SP 4.4.
Los dispositivos controladores de Bluetooth modo dual Texas Instruments CC256x y WL18xx, cuando se utiliza el modo de escaneo LE, permiten a atacantes remotos desencadenar un desbordamiento del búfer por medio de un paquete de publicidad Bluetooth Low Energy malformado, para causar una denegación de servicio o potencialmente ejecutar código arbitrario. Esto afecta a CC256xC-BT-SP versión 1.2, CC256xB-BT-SP versión 1.8 y WL18xx-BT-SP versión 4.4.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-09-05 CVE Reserved
- 2019-11-13 CVE Published
- 2024-08-05 CVE Updated
- 2024-11-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://e2e.ti.com/support/wireless-connectivity/bluetooth/f/538/t/856161 | Third Party Advisory | |
https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/ti_wl18xx_adv_rce.py | X_refsource_misc | |
https://github.com/darkmentorllc/publications/tree/master/2020/TI_SILABS_BLE_RCEs | X_refsource_misc | |
https://www.linkedin.com/in/veronica-kovah-2587185 | Not Applicable | |
https://www.youtube.com/watch?v=bk5lOxieqbA | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ti Search vendor "Ti" | Cc256xc-bt-sp Firmware Search vendor "Ti" for product "Cc256xc-bt-sp Firmware" | <= 1.2 Search vendor "Ti" for product "Cc256xc-bt-sp Firmware" and version " <= 1.2" | - |
Affected
| in | Ti Search vendor "Ti" | Cc256xc-bt-sp Search vendor "Ti" for product "Cc256xc-bt-sp" | - | - |
Safe
|
Ti Search vendor "Ti" | Cc256xb-bt-sp Firmware Search vendor "Ti" for product "Cc256xb-bt-sp Firmware" | <= 1.8 Search vendor "Ti" for product "Cc256xb-bt-sp Firmware" and version " <= 1.8" | - |
Affected
| in | Ti Search vendor "Ti" | Cc256xb-bt-sp Search vendor "Ti" for product "Cc256xb-bt-sp" | - | - |
Safe
|
Ti Search vendor "Ti" | Wl18xx-bt-sp Firmware Search vendor "Ti" for product "Wl18xx-bt-sp Firmware" | <= 4.4 Search vendor "Ti" for product "Wl18xx-bt-sp Firmware" and version " <= 4.4" | - |
Affected
| in | Ti Search vendor "Ti" | Wl18xx-bt-sp Search vendor "Ti" for product "Wl18xx-bt-sp" | - | - |
Safe
|