CVE-2025-44525

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to send specially crafted Bluetooth Low Energy (BLE) LL_Length_Req packets to Texas Instruments CC2652RB devices, causing a Denial of Service (DoS) by exploiting insufficient permission checks. It affects devices running SimpleLink CC13XX CC26XX SDK version 7.41.00.17. Any system using these vulnerable BLE chips in IoT, industrial, or consumer devices could be impacted.

💻 Affected Systems

Products:
  • Texas Instruments CC2652RB LaunchPad
  • Devices using SimpleLink CC13XX/CC26XX chips
Versions: SimpleLink CC13XX CC26XX SDK 7.41.00.17
Operating Systems: Embedded RTOS on TI chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any device using the vulnerable SDK version with BLE enabled. The vulnerability is in the BLE stack implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent device bricking requiring physical replacement, complete disruption of BLE communication in critical systems like medical devices or industrial controls.

🟠

Likely Case

Temporary DoS requiring device reboot, disruption of BLE connectivity in IoT devices until restart.

🟢

If Mitigated

Minimal impact if devices are behind network segmentation with BLE traffic filtering and have automatic recovery mechanisms.

🌐 Internet-Facing: LOW (BLE typically requires physical proximity, not internet connectivity)
🏢 Internal Only: MEDIUM (Attack requires physical proximity to vulnerable BLE devices within wireless range)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available on GitHub. Attack requires BLE radio capability and proximity to target device. No authentication needed for BLE packet transmission.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: UNKNOWN

Restart Required: Yes

Instructions:

1. Monitor Texas Instruments security advisories for patch release. 2. Update SDK to patched version when available. 3. Recompile and flash firmware to affected devices. 4. Test BLE functionality after update.

🔧 Temporary Workarounds

BLE Range Limitation

all

Physically isolate vulnerable devices or limit BLE transmission range

Disable Non-Essential BLE

all

Turn off BLE functionality if not required for device operation

// In firmware: disable BLE advertising and scanning
// Configuration setting in BLE stack

🧯 If You Can't Patch

  • Implement physical security controls to limit proximity access to vulnerable devices
  • Deploy network monitoring for abnormal BLE traffic patterns and implement BLE traffic filtering

🔍 How to Verify

Check if Vulnerable:

Check SDK version in device firmware: if using SimpleLink CC13XX CC26XX SDK 7.41.00.17, device is vulnerable.

Check Version:

Check firmware build information or use TI development tools to query SDK version

Verify Fix Applied:

After patch application, verify SDK version is updated and test with BLE fuzzing tools to confirm LL_Length_Req packets no longer cause DoS.

📡 Detection & Monitoring

Log Indicators:

  • Device reboot logs without apparent cause
  • BLE stack error messages
  • Connection resets in BLE logs

Network Indicators:

  • Unusual LL_Length_Req packets in BLE traffic captures
  • Abnormal BLE packet sizes exceeding specifications

SIEM Query:

Search for: device_type:"TI_CC2652RB" AND (event_type:"reboot" OR ble_error:"length")

🔗 References

📤 Share & Export