Published on: 07 September 2021
Multiple vulnerabilities, collectively known as BrakTooth, are found in the implementation of Bluetooth SoC boards from multiple vendors. An attacker within wireless range of the vulnerable Bluetooth devices could send a specially crafted Bluetooth Link Manager Protocol (LMP) packet to exploit the vulnerabilities.
It is strongly recommended to consult the product supplier and/or device manufacturer if the systems or devices are affected.
Depending on the vulnerability exploited, a successful attack could lead to denial-of-service or arbitrary code execution.
System administrators and users should check with their product vendors to confirm if their devices are affected and the availability of patches. System administrators and users should apply the patches or follow the recommendations provided by the product vendors to mitigate the risk.
List of affected vendors are made available in the following URL:
https://asset-group.github.io/disclosures/braktooth/
As a security best practice, Bluetooth on affected devices should be disabled when not in use.