Vulnerability Details CVE-2021-34144
The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 34.6%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 3.3
Products affected by CVE-2021-34144
-
cpe:2.3:h:zh-jieli:ac6936:-
-
cpe:2.3:h:zh-jieli:ac6951:-
-
cpe:2.3:h:zh-jieli:ac6952:-
-
cpe:2.3:h:zh-jieli:ac6954:-
-
cpe:2.3:h:zh-jieli:ac6955:-
-
cpe:2.3:h:zh-jieli:ac6956:-
-
cpe:2.3:h:zh-jieli:ac6963:-
-
cpe:2.3:h:zh-jieli:ac6965:-
-
cpe:2.3:h:zh-jieli:ac6966:-
-
cpe:2.3:h:zh-jieli:ac6969:-
-
cpe:2.3:h:zh-jieli:ac6973:-
-
cpe:2.3:h:zh-jieli:ac6976:-
-
cpe:2.3:h:zh-jieli:ac6983:-
-
cpe:2.3:h:zh-jieli:ac6986:-
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:-
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.2.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.3.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.4.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.5.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.6.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.7.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.7.1
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.8.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.9.0
-
cpe:2.3:o:zh-jieli:fw-ac63_bt_sdk:0.9.1