CVE-2024-24984

6.5 MEDIUM

📋 TL;DR

This vulnerability in Intel Wireless Bluetooth drivers for Windows allows an unauthenticated attacker within Bluetooth range to potentially cause denial of service by sending specially crafted packets. It affects users of Intel Bluetooth products on Windows systems with vulnerable driver versions. The attack requires physical proximity to the target device.

💻 Affected Systems

Products:
  • Intel Wireless Bluetooth products for Windows
Versions: All versions before 23.40
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel Bluetooth hardware and vulnerable driver versions. Requires Bluetooth to be enabled and discoverable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete Bluetooth service disruption requiring system reboot, potentially affecting all Bluetooth-connected devices and services.

🟠

Likely Case

Temporary Bluetooth connectivity loss affecting peripherals like mice, keyboards, and audio devices until service restarts.

🟢

If Mitigated

Minimal impact with proper network segmentation and Bluetooth usage policies in place.

🌐 Internet-Facing: LOW - Requires physical proximity via Bluetooth, not internet connectivity.
🏢 Internal Only: MEDIUM - Attack requires being within Bluetooth range (typically ~10 meters), making it relevant for physical office environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires proximity and knowledge of target Bluetooth address. No authentication needed once in range.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.40 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01108.html

Restart Required: Yes

Instructions:

1. Download Intel Driver & Support Assistant from Intel website. 2. Run the tool to detect vulnerable drivers. 3. Follow prompts to update to version 23.40 or later. 4. Restart system when prompted.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

windows

Turn off Bluetooth radio to prevent exploitation

Settings > Devices > Bluetooth & other devices > Turn Bluetooth Off

Set Bluetooth to non-discoverable

windows

Prevent device from being visible to nearby attackers

Settings > Devices > Bluetooth & other devices > More Bluetooth options > Uncheck 'Allow Bluetooth devices to find this PC'

🧯 If You Can't Patch

  • Implement physical security controls to limit unauthorized Bluetooth device proximity
  • Use network segmentation to isolate Bluetooth traffic and monitor for anomalous patterns

🔍 How to Verify

Check if Vulnerable:

Check Bluetooth driver version in Device Manager: Right-click Bluetooth device > Properties > Driver tab > Driver Version

Check Version:

Get-WmiObject Win32_PnPSignedDriver | Where-Object {$_.DeviceName -like '*Bluetooth*'} | Select-Object DeviceName, DriverVersion

Verify Fix Applied:

Verify driver version is 23.40 or higher in Device Manager

📡 Detection & Monitoring

Log Indicators:

  • Bluetooth service crashes in Windows Event Logs
  • Multiple failed Bluetooth connection attempts from unknown devices

Network Indicators:

  • Unusual Bluetooth traffic patterns
  • Multiple connection attempts from single MAC address

SIEM Query:

EventID=1000 OR EventID=1001 AND SourceName='BTHUSB' OR SourceName='BTHPORT'

🔗 References

📤 Share & Export