Texas Instruments Microcontrollers CC2640 and CC2650 are vulnerable to heap overflow
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-16986 - also known as BLEEDINGBIT
The above Texas Instruments controllers contain BLE-Stacks with a memory corruption vulnerability resulting from the mishandling of BLE advertising packets. The function llGetAdvChanPDU that is part of the embedded ROM image in both chips handles the incoming advertising packets and parses their headers. It copies the contents to a separate buffer provided by the calling function. The incorrect length of the packet is taken and ends up being parsed as larger packets than originally intended. If the incoming data is over a certain length, the function will call the halAssertHandler function, as defined by the application running on top of the stack, and not stop execution. Since the flow of execution does not stop, it will copy the overly large packet to the buffer and cause a heap overflow.
CVE-2018-7080 - also known as BLEEDINGBIT
An attacker could exploit the overflow in CVE-2018-16986 on certain network devices that use the above Texas Instruments chips if they have the Over the Air firmware Download (OAD) feature enabled to overwrite the firmware. The OAD feature allows for remote firmware updates of some BLE chips. An attacker could connect to a BLE chip on a vulnerable access point (either without authentication or by obtaining the password through other means depending on the implementation) and upload their own malicious firmware, which may contain malicious code that could give them complete control over the access point.
Using a specially crafted set of packets, an attacker can both control the data of the overflow, and the length of it, which may lead to remote code execution on the targeted BLE chip. An attacker needs to be within physical proximity to the device while it is in scanning mode to trigger vulnerable code. This memory corruption can lead to code execution on the main CPU of the device, which could have the potential to affect other devices across a network if the origin is a networked device. An attacker could also exploit this vulnerability to rewrite the operating system of a device and gain full control over it.
Update the BLE-Stack
This vulnerability was patched in BLE-Stack v2.2.2 released by Texas Instruments on March 28, 2018. Affected devices will require a firmware update to obtain the updated BLE-Stack.
Brocade Communication Systems
Check Point Software Technologies
D-Link Systems, Inc.
Toshiba Commerce Solutions
Akamai Technologies, Inc.
Android Open Source Project
Appgate Network Security
Arista Networks, Inc.
AsusTek Computer Inc.
Atheros Communications Inc.
Bell Canada Enterprises
BlueCat Networks, Inc.
Ceragon Networks Inc
Command Software Systems
DragonFly BSD Project
European Registry for Internet Domains
F5 Networks, Inc.
IBM Corporation (zseries)
Internet Systems Consortium
Internet Systems Consortium - DHCP
Interniche Technologies, inc.
Men & Mice
Mitel Networks, Inc.
QNX Software Systems Inc.
Red Hat, Inc.
Samsung Semiconductor Inc.
Secure64 Software Corporation
Slackware Linux Inc.
TippingPoint Technologies Inc.
We would like to thank Ben Seri at Armis for reporting this vulnerability.
This document was written by Madison Oliver.
|Date First Published:||2018-11-01|
|Date Last Updated:||2018-11-07 19:22 UTC|