Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-31613 : Security Advisory and Response

Discover the impact of CVE-2021-31613 on Zhuhai Jieli AC690X and AC692X devices. Learn about the Bluetooth Classic vulnerability, affected systems, exploitation risks, and mitigation strategies.

Bluetooth Classic implementation on Zhuhai Jieli AC690X and AC692X devices has a vulnerability where a crafted LMP packet can crash and restart a device.

Understanding CVE-2021-31613

This CVE details a flaw in the Bluetooth Classic implementation on specific devices that allows attackers to crash a device using a manipulated LMP packet.

What is CVE-2021-31613?

The vulnerability in Zhuhai Jieli AC690X and AC692X devices permits attackers within radio range to forcibly crash (and subsequently restart) a device with a tailored LMP packet.

The Impact of CVE-2021-31613

Exploitation could result in a denial of service condition, disrupting the normal operation of affected devices and potentially affecting user experience and device functionality.

Technical Details of CVE-2021-31613

The following technical aspects are associated with CVE-2021-31613:

Vulnerability Description

The issue arises from the mishandling of a truncated LMP packet during the LMP auto rate procedure, leading to device crashes upon receiving a specific type of malicious LMP packet.

Affected Systems and Versions

The affected systems are Zhuhai Jieli AC690X and AC692X. The specific vulnerable versions are not provided in the information available.

Exploitation Mechanism

By sending a specially crafted LMP packet, attackers within Bluetooth range can trigger a crash in the target device, leading to an immediate restart.

Mitigation and Prevention

Proactive measures can help mitigate the risks associated with CVE-2021-31613:

Immediate Steps to Take

Users should be cautious in enabling Bluetooth on vulnerable devices, especially in public or untrusted environments, to prevent potential attacks exploiting this vulnerability.

Long-Term Security Practices

Regularly updating devices with security patches and firmware upgrades can help address known vulnerabilities and enhance overall device security.

Patching and Updates

Users are advised to apply any security patches or updates provided by the device manufacturer to mitigate the risk of exploitation through this Bluetooth vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now