CVE-2023-46870

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code on systems running vulnerable versions of Nordic Semiconductor's nRF Sniffer for Bluetooth LE software. The issue stems from incorrect file permissions on Python and Bash scripts, enabling local attackers to modify these files and achieve code execution. Users of nRF Sniffer for Bluetooth LE versions 3.0.0 through 4.1.1 are affected.

💻 Affected Systems

Products:
  • Nordic Semiconductor nRF Sniffer for Bluetooth LE
Versions: 3.0.0, 3.1.0, 4.0.0, 4.1.0, 4.1.1
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of the specified versions. The vulnerability is in the extcap directory scripts used by Wireshark for Bluetooth LE packet capture.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/administrator privileges, installing persistent backdoors, stealing sensitive Bluetooth data, and pivoting to other network systems.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to Bluetooth sniffing data, system configuration changes, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper file permission controls and restricted user access preventing script modification.

🌐 Internet-Facing: LOW - This is primarily a local vulnerability requiring access to the system where the software is installed.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this, but requires specific software installation and local access vectors.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to modify the vulnerable scripts. Public proof-of-concept demonstrates the file permission issue and potential exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.2 or later

Vendor Advisory: https://www.nordicsemi.com/Products/Development-tools/nRF-Sniffer-for-Bluetooth-LE/Download

Restart Required: No

Instructions:

1. Download nRF Sniffer for Bluetooth LE version 4.1.2 or later from Nordic Semiconductor's website. 2. Uninstall the vulnerable version. 3. Install the updated version. 4. Verify file permissions on extcap scripts are properly set.

🔧 Temporary Workarounds

Fix file permissions manually

linux

Set correct file permissions on vulnerable scripts to prevent unauthorized modification

chmod 755 /path/to/extcap/nrf_sniffer_ble.py
chmod 755 /path/to/extcap/nrf_sniffer_ble.sh
chmod 755 /path/to/extcap/SnifferAPI/*.py

Remove write permissions for non-owners

linux

Ensure only file owners can modify the scripts

chmod o-w /path/to/extcap/nrf_sniffer_ble.py
chmod o-w /path/to/extcap/nrf_sniffer_ble.sh
chmod o-w /path/to/extcap/SnifferAPI/*.py

🧯 If You Can't Patch

  • Implement strict file integrity monitoring on the extcap directory
  • Restrict local user access to systems running nRF Sniffer software

🔍 How to Verify

Check if Vulnerable:

Check file permissions on extcap scripts: ls -la /path/to/extcap/nrf_sniffer_ble.py /path/to/extcap/nrf_sniffer_ble.sh /path/to/extcap/SnifferAPI/*.py

Check Version:

Check the software version in the nRF Sniffer GUI or documentation files

Verify Fix Applied:

Verify scripts have correct permissions (755 for Linux/Unix systems) and check version is 4.1.2 or later

📡 Detection & Monitoring

Log Indicators:

  • File modification events in extcap directory
  • Unexpected process execution from extcap scripts
  • Permission change alerts on nRF Sniffer files

Network Indicators:

  • Unusual Bluetooth packet capture activity
  • Suspicious outbound connections from nRF Sniffer processes

SIEM Query:

source="file_integrity" AND (file_path="*extcap*" OR process_name="*nrf*" OR process_name="*sniffer*")

🔗 References

📤 Share & Export