CVE-2025-44559

6.5 MEDIUM

📋 TL;DR

A vulnerability in Realtek RTL8762E BLE SDK v1.4.0 allows attackers within Bluetooth range to cause a Denial of Service (DoS) by sending specially crafted control packets. This affects devices using the vulnerable Bluetooth Low Energy stack, potentially disrupting Bluetooth functionality. The attack requires proximity to the target device.

💻 Affected Systems

Products:
  • Devices using Realtek RTL8762E Bluetooth Low Energy chipset
Versions: BLE SDK v1.4.0
Operating Systems: Any OS using the vulnerable BLE stack
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Bluetooth enabled and using the vulnerable SDK version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent Bluetooth functionality disruption requiring device restart or hardware reset, potentially affecting critical IoT or medical devices.

🟠

Likely Case

Temporary Bluetooth service disruption until device restarts, affecting consumer electronics and IoT devices.

🟢

If Mitigated

Minimal impact with proper network segmentation and Bluetooth range limitations.

🌐 Internet-Facing: LOW - Attack requires physical proximity via Bluetooth, not internet connectivity.
🏢 Internal Only: MEDIUM - Attackers within physical premises could disrupt Bluetooth-enabled devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available on GitHub demonstrates the attack sequence.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://realtek.com

Restart Required: Yes

Instructions:

1. Check Realtek website for updated BLE SDK. 2. Update firmware on affected devices. 3. Restart devices after update.

🔧 Temporary Workarounds

Disable Bluetooth when not needed

linux

Turn off Bluetooth functionality to prevent exploitation

sudo systemctl stop bluetooth
sudo systemctl disable bluetooth

Reduce Bluetooth range

linux

Limit Bluetooth transmission power to reduce attack surface

sudo hciconfig hci0 down
sudo hciconfig hci0 up -p 0

🧯 If You Can't Patch

  • Physically isolate Bluetooth devices from untrusted areas
  • Implement Bluetooth device whitelisting and pairing restrictions

🔍 How to Verify

Check if Vulnerable:

Check device specifications for Realtek RTL8762E chipset and BLE SDK version 1.4.0

Check Version:

Check device manufacturer documentation for firmware version

Verify Fix Applied:

Verify updated firmware version and test Bluetooth functionality under crafted packet conditions

📡 Detection & Monitoring

Log Indicators:

  • Bluetooth stack crashes
  • Unusual BLE control packet sequences
  • Bluetooth service restart logs

Network Indicators:

  • Abnormal BLE packet patterns
  • Repeated connection attempts with crafted packets

SIEM Query:

source="bluetooth" AND (event="crash" OR event="restart") AND packet_sequence="abnormal"

🔗 References

📤 Share & Export