CVE-2026-24801

N/A Unknown

📋 TL;DR

This vulnerability in Ralim IronOS affects the ECC/DSA cryptographic implementation in the Pinecilv2 Bluetooth stack. It could allow attackers to compromise cryptographic operations, potentially leading to data manipulation or unauthorized access. Users of IronOS firmware on Pinecilv2 soldering irons before version 2.23-rc3 are affected.

💻 Affected Systems

Products:
  • Ralim IronOS firmware for Pinecilv2 soldering irons
Versions: All versions before v2.23-rc3
Operating Systems: IronOS firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Bluetooth enabled and using the vulnerable cryptographic modules.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Bluetooth communication security, allowing attackers to forge commands, intercept sensitive data, or potentially execute arbitrary code on the device.

🟠

Likely Case

Cryptographic failures leading to data integrity issues, potential Bluetooth session hijacking, or unauthorized control of soldering iron functions.

🟢

If Mitigated

Limited impact if Bluetooth is disabled or device is used in isolated environments without untrusted Bluetooth connections.

🌐 Internet-Facing: LOW (Bluetooth has limited range, typically 10-100 meters)
🏢 Internal Only: MEDIUM (Bluetooth connections within physical proximity could be exploited)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity and knowledge of the vulnerability. No public exploits have been documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.23-rc3 and later

Vendor Advisory: https://github.com/Ralim/IronOS/pull/2087

Restart Required: Yes

Instructions:

1. Download latest IronOS firmware from GitHub releases. 2. Flash firmware to Pinecilv2 using DFU mode. 3. Verify successful update by checking version in device settings.

🔧 Temporary Workarounds

Disable Bluetooth

all

Turn off Bluetooth functionality to prevent exploitation via wireless attack vector

Navigate to device settings > Bluetooth > Disable

🧯 If You Can't Patch

  • Physically isolate device from untrusted Bluetooth connections
  • Use device in environments with strict Bluetooth access controls

🔍 How to Verify

Check if Vulnerable:

Check IronOS version in device settings. If version is below 2.23-rc3, device is vulnerable.

Check Version:

Check version in IronOS device settings menu

Verify Fix Applied:

After updating, confirm version shows 2.23-rc3 or higher in device settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth connection attempts
  • Cryptographic operation failures

Network Indicators:

  • Suspicious Bluetooth traffic patterns
  • Unexpected Bluetooth pairing requests

SIEM Query:

Not applicable for embedded device firmware

🔗 References

📤 Share & Export