Bluetooth

5 CVEs product

Monthly

CVE-2026-31393 Awaiting Data

Out-of-bounds read in Linux kernel Bluetooth L2CAP layer allows remote attackers to read adjacent kernel memory via truncated L2CAP_INFO_RSP packets with insufficient payload length. The l2cap_information_rsp() function validates only the fixed 4-byte header but then unconditionally accesses variable-length payload fields (feat_mask at offset +4 and fixed_chan at offset +1) without verifying the payload is present, triggering kernel memory disclosure on specially crafted Bluetooth frames.

Linux Linux Kernel Bluetooth Information Disclosure Denial Of Service
NVD
EPSS
0.0%
CVE-2026-23462 Awaiting Data

Use-after-free vulnerability in the Linux kernel's Bluetooth HIDP subsystem allows local attackers to trigger a kernel crash or potentially execute arbitrary code by failing to properly release L2CAP connection references when user callbacks are invoked. The flaw affects all Linux kernel versions in the CPE range and has been resolved through reference counting fixes in the L2CAP connection cleanup path; no public exploit code is currently identified, but the vulnerability requires local access to trigger via Bluetooth device manipulation.

Linux Linux Kernel Bluetooth Use After Free
NVD VulDB
EPSS
0.0%
CVE-2026-23299 PATCH Monitor

This vulnerability is a memory leak in the Linux kernel's Bluetooth subsystem where Socket Buffers (SKBs) queued into the sk_error_queue for TX timestamping are not properly purged during socket destruction, allowing sensitive timestamp data to persist in kernel memory. The vulnerability affects all Linux kernel versions that support Bluetooth with SO_TIMESTAMPING enabled (cpe:2.3:a:linux:linux:*:*:*:*:*:*:*:*). An attacker with local access could potentially read leaked kernel memory contents including timestamp information that should have been cleaned up, or trigger the leak by unexpectedly removing the Bluetooth controller while timestamped packets remain queued.

Linux Linux Kernel Bluetooth Denial Of Service Memory Corruption +2
NVD VulDB
EPSS
0.0%
CVE-2025-32879 HIGH POC This Week

CVE-2025-32879 is a security vulnerability (CVSS 8.8) that allows an attacker. Risk factors: public PoC available.

Authentication Bypass Bluetooth Information Disclosure Coros Pace 3 Firmware
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-20672 CRITICAL Act Now

Heap OOB write in Android Bluetooth driver via incorrect bounds check.

Bluetooth Privilege Escalation Buffer Overflow Mt7902 Firmware Mt7927 Firmware +3
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-31393
EPSS 0%
Awaiting Data

Out-of-bounds read in Linux kernel Bluetooth L2CAP layer allows remote attackers to read adjacent kernel memory via truncated L2CAP_INFO_RSP packets with insufficient payload length. The l2cap_information_rsp() function validates only the fixed 4-byte header but then unconditionally accesses variable-length payload fields (feat_mask at offset +4 and fixed_chan at offset +1) without verifying the payload is present, triggering kernel memory disclosure on specially crafted Bluetooth frames.

Linux Linux Kernel Bluetooth +2
NVD
CVE-2026-23462
EPSS 0%
Awaiting Data

Use-after-free vulnerability in the Linux kernel's Bluetooth HIDP subsystem allows local attackers to trigger a kernel crash or potentially execute arbitrary code by failing to properly release L2CAP connection references when user callbacks are invoked. The flaw affects all Linux kernel versions in the CPE range and has been resolved through reference counting fixes in the L2CAP connection cleanup path; no public exploit code is currently identified, but the vulnerability requires local access to trigger via Bluetooth device manipulation.

Linux Linux Kernel Bluetooth +1
NVD VulDB
CVE-2026-23299
EPSS 0%
PATCH Monitor

This vulnerability is a memory leak in the Linux kernel's Bluetooth subsystem where Socket Buffers (SKBs) queued into the sk_error_queue for TX timestamping are not properly purged during socket destruction, allowing sensitive timestamp data to persist in kernel memory. The vulnerability affects all Linux kernel versions that support Bluetooth with SO_TIMESTAMPING enabled (cpe:2.3:a:linux:linux:*:*:*:*:*:*:*:*). An attacker with local access could potentially read leaked kernel memory contents including timestamp information that should have been cleaned up, or trigger the leak by unexpectedly removing the Bluetooth controller while timestamped packets remain queued.

Linux Linux Kernel Bluetooth +4
NVD VulDB
CVE-2025-32879
EPSS 0% CVSS 8.8
HIGH POC This Week

CVE-2025-32879 is a security vulnerability (CVSS 8.8) that allows an attacker. Risk factors: public PoC available.

Authentication Bypass Bluetooth Information Disclosure +1
NVD
CVE-2025-20672
EPSS 0% CVSS 9.8
CRITICAL Act Now

Heap OOB write in Android Bluetooth driver via incorrect bounds check.

Bluetooth Privilege Escalation Buffer Overflow +5
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy