A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT). Specifically, an attacker could exploit a flaw that causes the BLE target (i.e., the device under attack) to attempt to disconnect a fixed channel, which is not allowed per the Bluetooth specification. This leads to undefined behavior, including potential assertion failures, crashes, or memory corruption, depending on the BLE stack implementation.
- In the function le_credits (
subsys/bluetooth/host/l2cap.c:2143
), which parses the “L2CAP Flow Control Credit Indication” request.
- When sending two requests for example (22 credits increase, and 65535 credits increase), the code correctly evaluate the an overflows occurs and send disconnection request.
- By creating a disconnection request it “allocates” an identifier associated with the request. This identifier points the channel which credits increase were requested for.
- By allocating an identifier the code becomes vulnerable to responses (as it sent a request) as will be seen later.
- The code does not check that the CID is 0x05 (LE SIGNAL CHANNEL) or any other of the fixed channels (SMP,
ATT...) Leading to the BLE target attempting to disconnect a “fixed channel”.
Impact
Remote crash or denial of service via malformed BLE traffic.
Patches
For more information
If you have any questions or comments about this advisory:
embargo: 2025-09-05
A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT). Specifically, an attacker could exploit a flaw that causes the BLE target (i.e., the device under attack) to attempt to disconnect a fixed channel, which is not allowed per the Bluetooth specification. This leads to undefined behavior, including potential assertion failures, crashes, or memory corruption, depending on the BLE stack implementation.
subsys/bluetooth/host/l2cap.c:2143
), which parses the “L2CAP Flow Control Credit Indication” request.ATT...) Leading to the BLE target attempting to disconnect a “fixed channel”.
Impact
Remote crash or denial of service via malformed BLE traffic.
Patches
For more information
If you have any questions or comments about this advisory:
embargo: 2025-09-05