CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
4DescriptionNVD
An issue in Texas Instruments LP-CC2652RB SimpleLink CC13XX CC26XX SDK 7.41.00.17 allows attackers to cause a Denial of Service (DoS) via sending a crafted LL_Pause_Enc_Req packet during the authentication and connection phase, causing a Denial of Service (DoS).
AnalysisAI
CVE-2025-44528 is a network-based Denial of Service vulnerability in Texas Instruments LP-CC2652RB SimpleLink CC13XX CC26XX SDK version 7.41.00.17 that allows unauthenticated remote attackers to crash or disable affected devices by sending a maliciously crafted LL_Pause_Enc_Req packet during the Bluetooth Low Energy authentication and connection establishment phase. The vulnerability has a CVSS 3.1 score of 7.5 (High) with no authentication required and low attack complexity, making it readily exploitable against vulnerable deployments. No KEV status, EPSS score, or public POC availability data was provided, but the network-accessible attack vector and lack of prerequisite conditions indicate moderate real-world risk for exposed BLE devices.
Technical ContextAI
The vulnerability exists in the Bluetooth Low Energy (BLE) protocol stack implementation within Texas Instruments' SimpleLink SDK, specifically in the Link Layer (LL) packet handling during the encryption pause negotiation phase. The affected component processes LL_Pause_Enc_Req frames, which are legitimate BLE control messages used to pause encryption during connection parameter updates. The root cause is classified under CWE-400 (Uncontrolled Resource Consumption), indicating the SDK fails to properly validate or rate-limit processing of these LL_Pause_Enc_Req packets, allowing an attacker to trigger resource exhaustion or unhandled exceptions that crash the BLE stack. The CC2652RB is a multi-protocol wireless microcontroller commonly used in IoT, smart home, and industrial applications, making the SDK a critical component in many embedded systems. The vulnerability manifests during the authentication and connection phase, a critical window where the device's BLE state machine is actively negotiating encryption parameters.
RemediationAI
Update Texas Instruments SimpleLink SDK to a version newer than 7.41.00.17. Check TI's official SimpleLink SDK release notes and security advisories for the patched version number. (Vendor) Workaround (if patch unavailable): Implement BLE packet filtering at the radio/MAC layer to drop malformed or unexpected LL_Pause_Enc_Req frames during connection setup. Configure connection timeout mechanisms to rapidly disconnect from peers sending anomalous Link Layer control messages. Network Mitigation: Reduce BLE radio exposure by disabling unnecessary advertising, limiting connection acceptance to whitelisted peer addresses, and shortening the connection window during pairing/authentication phases. Operational Mitigation: Deploy devices with automatic watchdog timers and firmware rollback capability to recover from DoS-induced crashes. Monitor device uptime and reboot logs for anomalous patterns.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18932