CVE-2019-15948
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
13/11/2019
Last modified:
18/08/2020
Description
Texas Instruments CC256x and WL18xx dual-mode Bluetooth controller devices, when LE scan mode is used, allow remote attackers to trigger a buffer overflow via a malformed Bluetooth Low Energy advertising packet, to cause a denial of service or potentially execute arbitrary code. This affects CC256xC-BT-SP 1.2, CC256xB-BT-SP 1.8, and WL18xx-BT-SP 4.4.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
5.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:ti:cc256xc-bt-sp_firmware:*:*:*:*:*:*:*:* | 1.2 (including) | |
| cpe:2.3:h:ti:cc256xc-bt-sp:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ti:cc256xb-bt-sp_firmware:*:*:*:*:*:*:*:* | 1.8 (including) | |
| cpe:2.3:h:ti:cc256xb-bt-sp:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:ti:wl18xx-bt-sp_firmware:*:*:*:*:*:*:*:* | 4.4 (including) | |
| cpe:2.3:h:ti:wl18xx-bt-sp:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://e2e.ti.com/support/wireless-connectivity/bluetooth/f/538/t/856161
- https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/ti_wl18xx_adv_rce.py
- https://github.com/darkmentorllc/publications/tree/master/2020/TI_SILABS_BLE_RCEs
- https://www.linkedin.com/in/veronica-kovah-2587185
- https://www.youtube.com/watch?v=bk5lOxieqbA



