mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
20 lines
984 B
Markdown
20 lines
984 B
Markdown
### [CVE-2021-28136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28136)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of multiple LMP IO Capability Request packets during the pairing process, allowing attackers in radio range to trigger memory corruption (and consequently a crash) in ESP32 via a replayed (duplicated) LMP packet.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://dl.packetstormsecurity.net/papers/general/braktooth.pdf
|
|
|
|
#### Github
|
|
- https://github.com/JeffroMF/awesome-bluetooth-security321
|
|
- https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks
|
|
- https://github.com/engn33r/awesome-bluetooth-security
|
|
|