Multiple vulnerabilities recently patched in Zephyr’s Bluetooth LE stack could be exploited to cause denial of service conditions, prevent further connections, or even leak sensitive information, according to a warning from researchers at the Synopsys Cybersecurity Research Center (CyRC).
Six of the flaws, the researcher explains, could be abused by an attacker by sending malformed input that would cause the device to freeze. This could result in the device rebooting itself or may even allow for remote code execution in some instances.
Other vulnerabilities could be exploited either to cause the device to misbehave and prevent other devices from connecting to it, or to access potentially sensitive information, including encryption keys or memory layout.
Offered under the Apache license, Zephyr is an operating system that provides support for various CPU architectures, including ARM Cortex-M, ARC, Intel x86, NIOS II, RISC-V 32, SPARC V8, and Tensilica Xtensa.
[ SEE: BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks ]
The platform includes support for multiple network protocols, including the full Bluetooth LE stack. The Bluetooth LE Link Layer (LL) and L2CAP implementations, Synopsys CyRC security researcher Matias Karhumaa discovered, were impacted by eight vulnerabilities that mainly provided attackers with the ability to freeze vulnerable devices when within Bluetooth LE range.
“All of the reported vulnerabilities can be triggered from within the range of Bluetooth LE. Triggering the vulnerability does not require authentication or encryption. The only requirement is that the device is in advertising mode and accepting connections,” the researcher explained.
Six of the eight vulnerabilities could be exploited to cause a denial of service (DoS) condition or freeze the target device, one could lead to deadlock, and another to information leakage. Two of the flaws are rated high severity, five medium and one low.
The most important of the issues are CVE-2021-3434, a stack buffer overflow leading to denial of service and potentially allowing for remote code execution, and CVE-2021-3455, a use-after-free that could lead to denial of service and potential remote code execution.
The vulnerabilities were reported to the Zephyr security team on March 11 and were addressed with the release of Zephyr 2.6.0 on June 5. Product manufacturers are encouraged to release software updates that include these patches, while users are advised to apply the available patches as soon as possible.
Related: BleedingTooth: Vulnerabilities in Linux Bluetooth Allow Zero-Click Attacks
Related: BLURtooth Vulnerability Can Allow Bluetooth MITM Attacks
Related: SweynTooth: Bluetooth Vulnerabilities Expose Many Devices to Attacks

More from Ionut Arghire
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
Latest News
- Burnout in Cybersecurity – Can it be Prevented?
- Spain Needs More Transparency Over Pegasus: EU Lawmakers
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Virtual Event Today: Supply Chain & Third-Party Risk Summit
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
