CVE-2026-24801
📋 TL;DR
This vulnerability in Ralim IronOS affects the ECC/DSA cryptographic implementation in the Pinecilv2 Bluetooth stack. It could allow attackers to compromise cryptographic operations, potentially leading to data manipulation or unauthorized access. Users of IronOS firmware on Pinecilv2 soldering irons before version 2.23-rc3 are affected.
💻 Affected Systems
- Ralim IronOS firmware for Pinecilv2 soldering irons
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Bluetooth communication security, allowing attackers to forge commands, intercept sensitive data, or potentially execute arbitrary code on the device.
Likely Case
Cryptographic failures leading to data integrity issues, potential Bluetooth session hijacking, or unauthorized control of soldering iron functions.
If Mitigated
Limited impact if Bluetooth is disabled or device is used in isolated environments without untrusted Bluetooth connections.
🎯 Exploit Status
Exploitation requires Bluetooth proximity and knowledge of the vulnerability. No public exploits have been documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v2.23-rc3 and later
Vendor Advisory: https://github.com/Ralim/IronOS/pull/2087
Restart Required: Yes
Instructions:
1. Download latest IronOS firmware from GitHub releases. 2. Flash firmware to Pinecilv2 using DFU mode. 3. Verify successful update by checking version in device settings.
🔧 Temporary Workarounds
Disable Bluetooth
allTurn off Bluetooth functionality to prevent exploitation via wireless attack vector
Navigate to device settings > Bluetooth > Disable
🧯 If You Can't Patch
- Physically isolate device from untrusted Bluetooth connections
- Use device in environments with strict Bluetooth access controls
🔍 How to Verify
Check if Vulnerable:
Check IronOS version in device settings. If version is below 2.23-rc3, device is vulnerable.
Check Version:
Check version in IronOS device settings menu
Verify Fix Applied:
After updating, confirm version shows 2.23-rc3 or higher in device settings.
📡 Detection & Monitoring
Log Indicators:
- Unusual Bluetooth connection attempts
- Cryptographic operation failures
Network Indicators:
- Suspicious Bluetooth traffic patterns
- Unexpected Bluetooth pairing requests
SIEM Query:
Not applicable for embedded device firmware