The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices accepts a pairing request with a key size greater than 16 bytes, allowing an attacker in radio range to cause a buffer overflow and denial of service (crash) via crafted packets.
References
Link | Resource |
---|---|
http://www.telink-semi.com/ble | Vendor Advisory |
https://asset-group.github.io/disclosures/sweyntooth/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2020-02-12 07:15
Updated : 2020-02-25 12:35
NVD link : CVE-2019-19196
Mitre link : CVE-2019-19196
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
telink-semi
- tlsr8258
- tlsr8251
- tlsr8251_ble_sdk
- tlsr8232_ble_sdk
- tlsr8269
- tlsr8232
- tlsr8253_ble_sdk
- tlsr8269_ble_sdk
- tlsr8253
- tlsr8258_ble_sdk