CVE-2024-2104

8.8 HIGH

📋 TL;DR

This vulnerability allows an attacker within Bluetooth Low Energy (BLE) range to read and write device control commands without authentication due to improper GATT server security configurations. This affects devices using the vulnerable mobile app service, potentially rendering them unusable. Attackers must be physically adjacent to the target device.

💻 Affected Systems

Products:
  • HARMAN devices with vulnerable BLE GATT server implementation
Versions: Specific versions not detailed in provided references; affected versions vary by device model.
Operating Systems: Embedded systems with BLE capabilities
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default BLE security configurations on affected devices' GATT servers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing permanent bricking, unauthorized control of device functions, and potential data exfiltration through adjacent BLE access.

🟠

Likely Case

Temporary device disruption, unauthorized command execution, and potential denial of service through adjacent BLE attacks.

🟢

If Mitigated

Limited impact with proper BLE security controls, authentication requirements, and network segmentation in place.

🌐 Internet-Facing: LOW - Exploitation requires physical proximity via BLE, not internet connectivity.
🏢 Internal Only: HIGH - Attackers within BLE range (typically ~10 meters) can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires BLE proximity and basic BLE communication tools, but no public exploit code is confirmed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisories for specific device updates

Vendor Advisory: https://harman.csaf-tp.certvde.com/.well-known/csaf/white/2025/hbsa-2025-0001.json

Restart Required: Yes

Instructions:

1. Check HARMAN security advisory for affected devices. 2. Apply vendor-provided firmware updates. 3. Restart devices after patching. 4. Verify BLE security configurations post-update.

🔧 Temporary Workarounds

Disable BLE when not needed

all

Turn off Bluetooth Low Energy functionality to prevent adjacent attacks

Device-specific BLE disable command (varies by device)

Implement BLE authentication

all

Configure GATT server to require authentication for read/write operations

BLE security configuration commands (device-specific)

🧯 If You Can't Patch

  • Physically isolate devices in secure areas to limit BLE proximity attacks
  • Implement network segmentation and monitor for unusual BLE communication patterns

🔍 How to Verify

Check if Vulnerable:

Use BLE scanning tools to check if device GATT services allow unauthenticated read/write operations

Check Version:

Device-specific firmware version check command (consult device documentation)

Verify Fix Applied:

Test BLE communication post-patch to confirm authentication is required for GATT operations

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized BLE connection attempts
  • Unexpected GATT service read/write operations
  • Device control commands from unknown BLE devices

Network Indicators:

  • Unusual BLE traffic patterns
  • Multiple failed BLE authentication attempts
  • BLE connections from unexpected MAC addresses

SIEM Query:

Example: BLE connection events where authentication = false AND (operation = read OR operation = write)

🔗 References

📤 Share & Export