CVE-2024-5754

8.2 HIGH

📋 TL;DR

This vulnerability in Zephyr RTOS Bluetooth stack allows attackers to bypass encryption procedures, potentially enabling unauthorized access to Bluetooth communications. It affects devices running vulnerable versions of Zephyr RTOS with Bluetooth functionality enabled.

💻 Affected Systems

Products:
  • Zephyr RTOS
Versions: Versions prior to 3.7.1
Operating Systems: Zephyr RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Bluetooth functionality enabled and using vulnerable encryption procedures.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Bluetooth communications, allowing eavesdropping, data manipulation, and potential device takeover in IoT/embedded systems.

🟠

Likely Case

Unauthorized access to Bluetooth data streams, potential for man-in-the-middle attacks, and privacy violations.

🟢

If Mitigated

Limited impact with proper network segmentation and Bluetooth security controls in place.

🌐 Internet-Facing: MEDIUM - Requires proximity to target device but could be exploited via internet-connected Bluetooth gateways.
🏢 Internal Only: HIGH - Bluetooth devices within physical range are vulnerable to local attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity and knowledge of vulnerable encryption procedures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Zephyr RTOS 3.7.1 and later

Vendor Advisory: https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gvv5-66hw-5qrc

Restart Required: Yes

Instructions:

1. Update Zephyr RTOS to version 3.7.1 or later. 2. Rebuild and redeploy firmware to affected devices. 3. Verify Bluetooth encryption procedures are properly implemented.

🔧 Temporary Workarounds

Disable Bluetooth if not required

all

Temporarily disable Bluetooth functionality to eliminate attack surface

CONFIG_BT=n in project configuration

Implement additional encryption layers

all

Add application-level encryption for sensitive Bluetooth communications

🧯 If You Can't Patch

  • Segment Bluetooth networks from critical infrastructure
  • Implement physical security controls to limit Bluetooth proximity access

🔍 How to Verify

Check if Vulnerable:

Check Zephyr RTOS version and verify if Bluetooth is enabled with vulnerable encryption procedures

Check Version:

Check Zephyr version in build configuration or via device firmware version query

Verify Fix Applied:

Confirm Zephyr RTOS version is 3.7.1 or later and test Bluetooth encryption functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth pairing attempts
  • Encryption procedure failures
  • Unexpected Bluetooth connection requests

Network Indicators:

  • Anomalous Bluetooth traffic patterns
  • Unauthorized Bluetooth device connections

SIEM Query:

Bluetooth AND (encryption_failure OR unauthorized_pairing)

🔗 References

📤 Share & Export