CVE-2025-68473

8.6 HIGH

📋 TL;DR

This vulnerability is an out-of-bounds write in the ESP-IDF Bluetooth host stack that occurs when more than 32 services are discovered during Bluetooth SDP. It affects IoT devices using vulnerable ESP-IDF versions, potentially allowing attackers to execute arbitrary code or crash devices via specially crafted Bluetooth packets.

💻 Affected Systems

Products:
  • ESP-IDF (Espressif IoT Development Framework)
Versions: 5.5.1, 5.4.3, 5.3.4, 5.2.6, 5.1.6 and earlier versions
Operating Systems: ESP-IDF based systems (primarily ESP32, ESP32-S series microcontrollers)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any device with Bluetooth enabled using the vulnerable BlueDroid stack in ESP-IDF

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or device bricking

🟠

Likely Case

Device crash/reboot causing denial of service and potential data corruption

🟢

If Mitigated

Limited impact if Bluetooth is disabled or devices are isolated from untrusted Bluetooth sources

🌐 Internet-Facing: MEDIUM - Requires Bluetooth proximity but devices may be exposed in public IoT deployments
🏢 Internal Only: MEDIUM - Internal Bluetooth-enabled devices could be targeted by malicious insiders or compromised devices

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity and ability to send malicious SDP responses, but no authentication is needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in ESP-IDF releases after the listed vulnerable versions (check specific commit fixes)

Vendor Advisory: https://github.com/espressif/esp-idf/security/advisories

Restart Required: Yes

Instructions:

1. Update ESP-IDF to latest version
2. Recompile and flash firmware to affected devices
3. Verify Bluetooth functionality post-update

🔧 Temporary Workarounds

Disable Bluetooth

all

Disable Bluetooth functionality if not required

Modify sdkconfig to set CONFIG_BT_ENABLED=n

Limit Bluetooth Discovery

all

Restrict Bluetooth discovery to trusted devices only

Implement Bluetooth pairing/whitelisting in application code

🧯 If You Can't Patch

  • Segment Bluetooth network - isolate vulnerable devices from untrusted Bluetooth sources
  • Implement physical security controls to limit Bluetooth proximity access

🔍 How to Verify

Check if Vulnerable:

Check ESP-IDF version in firmware or build configuration. Vulnerable if version is 5.5.1, 5.4.3, 5.3.4, 5.2.6, 5.1.6 or earlier

Check Version:

grep 'ESP-IDF' version.txt or check sdkconfig version settings

Verify Fix Applied:

Verify ESP-IDF version is updated beyond vulnerable versions and check for presence of fix commits in the codebase

📡 Detection & Monitoring

Log Indicators:

  • Bluetooth stack crashes
  • SDP protocol errors
  • Memory corruption warnings

Network Indicators:

  • Unusual Bluetooth SDP traffic patterns
  • Multiple service advertisements from single device

SIEM Query:

bluetooth AND (crash OR reboot OR sdp) FROM iot_device

🔗 References

📤 Share & Export