CVE-2024-34463: n/a
BPL Personal Weighing Scale PWS-01BT IND/09/18/599 devices send sensitive information in unencrypted BLE packets. (The packet data also lacks authentication and integrity protection.)
AI Analysis
Technical Summary
CVE-2024-34463 identifies a security vulnerability in the BPL Personal Weighing Scale PWS-01BT, where sensitive information is transmitted over Bluetooth Low Energy (BLE) packets without encryption, authentication, or integrity checks. BLE is commonly used for short-range wireless communication in personal health devices. In this case, the device sends data such as weight measurements or possibly user identifiers in plaintext, making it susceptible to eavesdropping by any attacker within BLE range (typically up to 10 meters). The absence of authentication and integrity protection means attackers can not only intercept but potentially alter the data packets, leading to misinformation or privacy breaches. The vulnerability is classified under CWE-285 (Improper Authorization), indicating a failure to enforce proper access controls on transmitted data. The CVSS v3.1 base score of 5.1 reflects that the attack vector is local (physical proximity required), with low complexity and no privileges or user interaction needed. The impact affects confidentiality and integrity but not availability. No patches or fixes have been published yet, and no known exploits have been observed in the wild, suggesting this is a newly disclosed issue. However, the risk remains significant for users who rely on these devices for personal health monitoring, as sensitive biometric data could be exposed or manipulated.
Potential Impact
The primary impact of this vulnerability is the compromise of user privacy and data integrity. Sensitive biometric data such as weight measurements, which may be linked to personal health profiles, can be intercepted by attackers nearby, leading to potential privacy violations. Manipulation of data packets could cause incorrect readings to be recorded or displayed, undermining trust in the device and potentially affecting health decisions based on inaccurate data. For organizations, especially healthcare providers or fitness centers using these devices, this could lead to regulatory compliance issues related to data protection laws such as GDPR or HIPAA. Although the attack requires physical proximity, the widespread use of BLE devices in homes, gyms, and clinics increases the attack surface. The lack of authentication and encryption also means that attackers can perform passive surveillance or active data tampering without alerting users. While availability is not affected, the breach of confidentiality and integrity can have reputational and operational consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should consider the following specific actions: 1) Avoid using the affected BPL PWS-01BT devices in environments where sensitive data interception is a concern until a firmware update or patch is released. 2) Contact the manufacturer to request security updates or inquire about planned fixes addressing encryption and authentication of BLE communications. 3) Employ physical security controls to limit unauthorized proximity to the devices, such as restricting access to areas where the scales are used. 4) Use network monitoring tools capable of detecting unusual BLE traffic patterns that might indicate eavesdropping or data manipulation attempts. 5) Where possible, replace vulnerable devices with alternatives that implement secure BLE protocols including encryption, authentication, and integrity checks. 6) Educate users about the risks of transmitting sensitive data over unsecured wireless channels and encourage best practices for device placement and usage. 7) For organizations, integrate this vulnerability into risk assessments and compliance audits to ensure data protection policies address BLE device security. These steps go beyond generic advice by focusing on device-specific controls, manufacturer engagement, and environmental security.
Affected Countries
India, United States, United Kingdom, Germany, Australia, Canada, France, Brazil, South Africa, United Arab Emirates
CVE-2024-34463: n/a
Description
BPL Personal Weighing Scale PWS-01BT IND/09/18/599 devices send sensitive information in unencrypted BLE packets. (The packet data also lacks authentication and integrity protection.)
AI-Powered Analysis
Technical Analysis
CVE-2024-34463 identifies a security vulnerability in the BPL Personal Weighing Scale PWS-01BT, where sensitive information is transmitted over Bluetooth Low Energy (BLE) packets without encryption, authentication, or integrity checks. BLE is commonly used for short-range wireless communication in personal health devices. In this case, the device sends data such as weight measurements or possibly user identifiers in plaintext, making it susceptible to eavesdropping by any attacker within BLE range (typically up to 10 meters). The absence of authentication and integrity protection means attackers can not only intercept but potentially alter the data packets, leading to misinformation or privacy breaches. The vulnerability is classified under CWE-285 (Improper Authorization), indicating a failure to enforce proper access controls on transmitted data. The CVSS v3.1 base score of 5.1 reflects that the attack vector is local (physical proximity required), with low complexity and no privileges or user interaction needed. The impact affects confidentiality and integrity but not availability. No patches or fixes have been published yet, and no known exploits have been observed in the wild, suggesting this is a newly disclosed issue. However, the risk remains significant for users who rely on these devices for personal health monitoring, as sensitive biometric data could be exposed or manipulated.
Potential Impact
The primary impact of this vulnerability is the compromise of user privacy and data integrity. Sensitive biometric data such as weight measurements, which may be linked to personal health profiles, can be intercepted by attackers nearby, leading to potential privacy violations. Manipulation of data packets could cause incorrect readings to be recorded or displayed, undermining trust in the device and potentially affecting health decisions based on inaccurate data. For organizations, especially healthcare providers or fitness centers using these devices, this could lead to regulatory compliance issues related to data protection laws such as GDPR or HIPAA. Although the attack requires physical proximity, the widespread use of BLE devices in homes, gyms, and clinics increases the attack surface. The lack of authentication and encryption also means that attackers can perform passive surveillance or active data tampering without alerting users. While availability is not affected, the breach of confidentiality and integrity can have reputational and operational consequences.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should consider the following specific actions: 1) Avoid using the affected BPL PWS-01BT devices in environments where sensitive data interception is a concern until a firmware update or patch is released. 2) Contact the manufacturer to request security updates or inquire about planned fixes addressing encryption and authentication of BLE communications. 3) Employ physical security controls to limit unauthorized proximity to the devices, such as restricting access to areas where the scales are used. 4) Use network monitoring tools capable of detecting unusual BLE traffic patterns that might indicate eavesdropping or data manipulation attempts. 5) Where possible, replace vulnerable devices with alternatives that implement secure BLE protocols including encryption, authentication, and integrity checks. 6) Educate users about the risks of transmitting sensitive data over unsecured wireless channels and encourage best practices for device placement and usage. 7) For organizations, integrate this vulnerability into risk assessments and compliance audits to ensure data protection policies address BLE device security. These steps go beyond generic advice by focusing on device-specific controls, manufacturer engagement, and environmental security.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c50b7ef31ef0b5627e2
Added to database: 2/25/2026, 9:40:32 PM
Last enriched: 2/26/2026, 4:44:47 AM
Last updated: 2/26/2026, 6:54:32 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.