漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
The Bluetooth Classic Audio implementation on Actions ATS2815 and ATS2819 devices does not properly handle a connection attempt from a host with the same BDAddress as the current connected BT host, allowing attackers to trigger a disconnection and deadlock of the device by connecting with a forged BDAddress that matches the original connected host.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Actions ATS2815 输入验证错误漏洞
Vulnerability Description
Actions ATS2815是Actions的一款蓝牙芯片。 Actions ATS2815 存在输入验证错误漏洞,该漏洞源于Actions ATS2815 和 ATS2819 芯片组上的蓝牙经典实现无法正确处理多个 LMP_host_connection_req 数据包的接收,允许无线电范围内的攻击者通过精心制作的 LMP 数据包触发设备拒绝服务(死锁)。需要手动用户干预才能重新启动设备并恢复蓝牙通信。
CVSS Information
N/A
Vulnerability Type
N/A