The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices installs a zero long term key (LTK) if an out-of-order link-layer encryption request is received during Secure Connections pairing. An attacker in radio range can have arbitrary read/write access to protected GATT service data, cause a device crash, or possibly control a device's function by establishing an encrypted session with the zero LTK.
References
Link | Resource |
---|---|
http://www.telink-semi.com/ble | Vendor Advisory |
https://asset-group.github.io/disclosures/sweyntooth/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2020-02-12 07:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-19194
Mitre link : CVE-2019-19194
JSON object : View
CWE
Products Affected
telink-semi
- tlsr8258
- tlsr8251
- tlsr8251_ble_sdk
- tlsr8232_ble_sdk
- tlsr8269
- tlsr8232
- tlsr8253_ble_sdk
- tlsr8269_ble_sdk
- tlsr8253
- tlsr8258_ble_sdk