CVE-2025-65828

6.5 MEDIUM

📋 TL;DR

An unauthenticated attacker within Bluetooth range can send BLE commands to Meatmeet devices, causing denial of service by shutting down, restarting, or clearing device configuration. This affects Meatmeet device users who would lose connectivity to cloud services until devices are reconfigured or restarted.

💻 Affected Systems

Products:
  • Meatmeet devices
Versions: All versions prior to patch
Operating Systems: Embedded device firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires physical proximity within Bluetooth range (typically ~10 meters).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass device disruption across an area, requiring physical access to each device for reconfiguration, causing extended service outage.

🟠

Likely Case

Localized device disruption requiring user intervention to restart or reconfigure affected devices.

🟢

If Mitigated

Limited impact if Bluetooth range restrictions apply and devices are physically secured.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires BLE communication tools and proximity to target devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://meatmeet.com

Restart Required: No

Instructions:

Check vendor website for firmware updates and apply following manufacturer instructions.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

all

Turn off Bluetooth functionality on Meatmeet devices when not actively pairing or communicating.

Physical isolation

all

Place devices in areas with limited physical access to reduce attacker proximity.

🧯 If You Can't Patch

  • Implement physical security controls to limit proximity access to devices
  • Monitor for unusual BLE activity and device disconnections

🔍 How to Verify

Check if Vulnerable:

Test if BLE commands can be sent to device without authentication using tools like gatttool or nRF Connect.

Check Version:

Check device firmware version through manufacturer app or interface.

Verify Fix Applied:

Attempt to send shutdown/restart/clear config commands via BLE and verify they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device shutdowns
  • Configuration reset events
  • BLE connection attempts from unknown MAC addresses

Network Indicators:

  • Sudden loss of device connectivity
  • Multiple devices going offline simultaneously in same area

SIEM Query:

Device logs showing 'shutdown', 'restart', or 'config cleared' events from BLE sources

🔗 References

📤 Share & Export