EUVD-2025-18932

| CVE-2025-44528 HIGH
2025-06-23 [email protected]
7.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 22:10 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:10 euvd
EUVD-2025-18932
PoC Detected
Jun 24, 2025 - 18:15 vuln.today
Public exploit code
CVE Published
Jun 23, 2025 - 20:15 nvd
HIGH 7.5

DescriptionNVD

An issue in Texas Instruments LP-CC2652RB SimpleLink CC13XX CC26XX SDK 7.41.00.17 allows attackers to cause a Denial of Service (DoS) via sending a crafted LL_Pause_Enc_Req packet during the authentication and connection phase, causing a Denial of Service (DoS).

AnalysisAI

CVE-2025-44528 is a network-based Denial of Service vulnerability in Texas Instruments LP-CC2652RB SimpleLink CC13XX CC26XX SDK version 7.41.00.17 that allows unauthenticated remote attackers to crash or disable affected devices by sending a maliciously crafted LL_Pause_Enc_Req packet during the Bluetooth Low Energy authentication and connection establishment phase. The vulnerability has a CVSS 3.1 score of 7.5 (High) with no authentication required and low attack complexity, making it readily exploitable against vulnerable deployments. No KEV status, EPSS score, or public POC availability data was provided, but the network-accessible attack vector and lack of prerequisite conditions indicate moderate real-world risk for exposed BLE devices.

Technical ContextAI

The vulnerability exists in the Bluetooth Low Energy (BLE) protocol stack implementation within Texas Instruments' SimpleLink SDK, specifically in the Link Layer (LL) packet handling during the encryption pause negotiation phase. The affected component processes LL_Pause_Enc_Req frames, which are legitimate BLE control messages used to pause encryption during connection parameter updates. The root cause is classified under CWE-400 (Uncontrolled Resource Consumption), indicating the SDK fails to properly validate or rate-limit processing of these LL_Pause_Enc_Req packets, allowing an attacker to trigger resource exhaustion or unhandled exceptions that crash the BLE stack. The CC2652RB is a multi-protocol wireless microcontroller commonly used in IoT, smart home, and industrial applications, making the SDK a critical component in many embedded systems. The vulnerability manifests during the authentication and connection phase, a critical window where the device's BLE state machine is actively negotiating encryption parameters.

RemediationAI

Update Texas Instruments SimpleLink SDK to a version newer than 7.41.00.17. Check TI's official SimpleLink SDK release notes and security advisories for the patched version number. (Vendor) Workaround (if patch unavailable): Implement BLE packet filtering at the radio/MAC layer to drop malformed or unexpected LL_Pause_Enc_Req frames during connection setup. Configure connection timeout mechanisms to rapidly disconnect from peers sending anomalous Link Layer control messages. Network Mitigation: Reduce BLE radio exposure by disabling unnecessary advertising, limiting connection acceptance to whitelisted peer addresses, and shortening the connection window during pairing/authentication phases. Operational Mitigation: Deploy devices with automatic watchdog timers and firmware rollback capability to recover from DoS-induced crashes. Monitor device uptime and reboot logs for anomalous patterns.

Share

EUVD-2025-18932 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy