CVE-2024-6657

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to cause a denial of service to Bluetooth Low Energy (BLE) peripheral devices by repeatedly connecting and disconnecting from them. The affected peripheral device becomes unresponsive and requires a hard reset to recover. This impacts any BLE peripheral devices using vulnerable firmware from Silicon Labs.

💻 Affected Systems

Products:
  • Silicon Labs BLE-enabled devices
Versions: Specific versions not detailed in reference; likely multiple firmware versions
Operating Systems: Embedded systems running Silicon Labs BLE stack
Default Config Vulnerable: ⚠️ Yes
Notes: Affects BLE peripheral devices using Silicon Labs chips/firmware. Central devices (like smartphones) are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical BLE peripheral devices (medical devices, industrial sensors, security systems) become permanently unavailable until physically reset, potentially disrupting operations or safety functions.

🟠

Likely Case

BLE devices in public or shared environments become temporarily unavailable, requiring manual intervention to restore functionality.

🟢

If Mitigated

With proper network segmentation and connection rate limiting, impact is limited to isolated devices with quick recovery procedures.

🌐 Internet-Facing: LOW - BLE typically requires physical proximity (within ~100 meters), making remote internet exploitation unlikely without additional attack vectors.
🏢 Internal Only: MEDIUM - Within physical range, attackers can disrupt BLE devices in offices, factories, or public spaces without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical proximity to target BLE device and ability to send connection requests. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference; check Silicon Labs advisory

Vendor Advisory: https://community.silabs.com/068Vm00000FfVNN

Restart Required: Yes

Instructions:

1. Check Silicon Labs advisory for specific firmware updates. 2. Update BLE peripheral device firmware to patched version. 3. Perform hard reset if device is currently affected.

🔧 Temporary Workarounds

Connection Rate Limiting

all

Implement connection attempt rate limiting on BLE peripherals if supported by firmware

Physical Security Controls

all

Restrict physical access to BLE devices to prevent proximity-based attacks

🧯 If You Can't Patch

  • Isolate BLE devices in physically secure areas to prevent unauthorized proximity access
  • Implement monitoring for unusual connection patterns and prepare manual reset procedures

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Silicon Labs advisory. Test by attempting rapid connect/disconnect cycles from multiple central devices.

Check Version:

Device-specific; typically through manufacturer's configuration tool or AT commands

Verify Fix Applied:

After patching, test with rapid connection attempts; device should remain responsive without requiring reset.

📡 Detection & Monitoring

Log Indicators:

  • Unusually high frequency of BLE connection/disconnection events
  • Peripheral device becoming unresponsive in logs

Network Indicators:

  • Multiple MAC addresses rapidly connecting to same BLE peripheral
  • BLE advertisement packets followed by immediate disconnections

SIEM Query:

BLE connection events where count(connection_attempts) > threshold within short time window

🔗 References

📤 Share & Export