CVE-2022-30904

8.2 HIGH

📋 TL;DR

A buffer overflow vulnerability in Bestechnic Bluetooth Mesh SDK allows attackers to execute arbitrary code during device provisioning by sending specially crafted Transaction Start PDU packets. This affects devices using BES2300 Bluetooth chips with the vulnerable SDK version. Attackers within Bluetooth range can potentially compromise affected IoT devices.

💻 Affected Systems

Products:
  • Devices using Bestechnic BES2300 Bluetooth chips with Bluetooth Mesh SDK
Versions: Bestechnic Bluetooth Mesh SDK V1.0
Operating Systems: Embedded systems using BES2300 chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices during provisioning phase when Bluetooth Mesh is being configured. Production devices that have completed provisioning may still be vulnerable if they accept new provisioning requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, allowing attackers to install persistent malware, exfiltrate data, or pivot to other network devices.

🟠

Likely Case

Device crash/denial of service or limited code execution allowing data manipulation or credential theft from the affected device.

🟢

If Mitigated

If proper network segmentation and Bluetooth security controls are in place, impact limited to isolated device compromise without network lateral movement.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity and knowledge of Bluetooth Mesh provisioning process. No authentication needed during provisioning phase.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later versions of Bestechnic Bluetooth Mesh SDK (specific version not specified in references)

Vendor Advisory: https://docs.google.com/document/d/1is3dYwMcRIkhjvujzi5OgnaGBsQVtlew/edit

Restart Required: Yes

Instructions:

1. Contact Bestechnic for updated SDK version. 2. Recompile firmware with patched SDK. 3. Deploy updated firmware to affected devices. 4. Verify provisioning functionality post-update.

🔧 Temporary Workarounds

Disable Bluetooth Mesh provisioning

all

Prevent new device provisioning to block exploitation vector

Device-specific configuration commands to disable provisioning mode

Network segmentation

all

Isolate Bluetooth Mesh devices from critical network segments

🧯 If You Can't Patch

  • Physically isolate affected devices in secure areas to limit Bluetooth range
  • Implement strict Bluetooth access controls and monitor for unauthorized provisioning attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version and SDK used. If using Bestechnic Bluetooth Mesh SDK V1.0 with BES2300 chips, assume vulnerable.

Check Version:

Device-specific command to check firmware/SDK version (varies by manufacturer)

Verify Fix Applied:

Verify updated SDK version is used and test provisioning with malformed Transaction Start PDU containing invalid SegN values.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed provisioning attempts
  • Device crashes during provisioning
  • Unexpected memory access errors

Network Indicators:

  • Unusual Bluetooth Mesh provisioning traffic
  • Multiple Transaction Start PDU packets with large SegN values

SIEM Query:

bluetooth AND mesh AND provisioning AND (error OR crash OR overflow)

🔗 References

📤 Share & Export