CVE-2025-9558

7.6 HIGH

📋 TL;DR

CVE-2025-9558 is a buffer overflow vulnerability in Zephyr RTOS's Bluetooth provisioning code that allows attackers to write data beyond allocated memory boundaries. This affects devices running Zephyr RTOS with Bluetooth provisioning enabled. Attackers could potentially execute arbitrary code or crash affected devices.

💻 Affected Systems

Products:
  • Zephyr RTOS
Versions: All versions prior to the fix
Operating Systems: Zephyr RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Bluetooth provisioning enabled; many IoT/embedded devices use Zephyr RTOS

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data exfiltration, or persistent backdoor installation

🟠

Likely Case

Device crash or denial of service through memory corruption, potentially requiring physical reset

🟢

If Mitigated

Limited impact with proper network segmentation and Bluetooth security controls

🌐 Internet-Facing: MEDIUM - Requires Bluetooth proximity but could be exploited via adjacent networks
🏢 Internal Only: MEDIUM - Bluetooth range limitation reduces widespread internal exploitation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity and knowledge of the provisioning process

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub advisory for specific commit

Vendor Advisory: https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8wvr-688x-68vr

Restart Required: Yes

Instructions:

1. Update Zephyr RTOS to latest version
2. Apply security patch from GitHub advisory
3. Rebuild and redeploy firmware
4. Restart affected devices

🔧 Temporary Workarounds

Disable Bluetooth provisioning

all

Disable the vulnerable provisioning feature if not required

CONFIG_BT_MESH_PROV=n in Kconfig

Network segmentation

all

Isolate Bluetooth devices from critical networks

🧯 If You Can't Patch

  • Implement strict Bluetooth access controls and device whitelisting
  • Monitor for abnormal Bluetooth provisioning attempts and device crashes

🔍 How to Verify

Check if Vulnerable:

Check if device uses Zephyr RTOS with Bluetooth provisioning enabled and version is unpatched

Check Version:

Check Zephyr version in build configuration or device firmware info

Verify Fix Applied:

Verify Zephyr version includes the security fix commit and Bluetooth provisioning works without crashes

📡 Detection & Monitoring

Log Indicators:

  • Memory corruption errors
  • Bluetooth provisioning failures
  • Device crashes/reboots

Network Indicators:

  • Abnormal Bluetooth provisioning packets
  • Excessive Bluetooth connection attempts

SIEM Query:

device_logs: ("memory corruption" OR "buffer overflow" OR "panic") AND source:"zephyr_device"

🔗 References

📤 Share & Export