Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46539: n/a

0
High
VulnerabilityCVE-2024-46539cvecve-2024-46539
Published: Tue Oct 08 2024 (10/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure permissions in the Bluetooth Low Energy (BLE) component of Fire-Boltt Artillery Smart Watch NJ-R6E-10.3 allow attackers to cause a Denial of Service (DoS).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:40:57 UTC

Technical Analysis

CVE-2024-46539 is a vulnerability identified in the Bluetooth Low Energy (BLE) component of the Fire-Boltt Artillery Smart Watch NJ-R6E-10.3. The root cause is insecure permissions within the BLE implementation, which allows attackers to remotely cause a Denial of Service (DoS) condition. Specifically, the vulnerability is classified under CWE-284 (Improper Access Control), indicating that the BLE component does not enforce adequate permission checks before processing certain requests or commands. The attack vector is remote over the Bluetooth interface, requiring no privileges or user interaction, making exploitation relatively straightforward for an attacker within Bluetooth range. The vulnerability affects the availability of the device by potentially causing it to crash or become unresponsive, while confidentiality is only minimally impacted and integrity remains intact. The CVSS v3.1 base score is 8.2, reflecting high severity due to the ease of exploitation and the impact on availability. No patches or fixes have been published at the time of disclosure, and there are no known exploits in the wild. This vulnerability highlights the risks associated with insecure BLE implementations in IoT and wearable devices, emphasizing the need for robust access control mechanisms in Bluetooth services.

Potential Impact

The primary impact of CVE-2024-46539 is on the availability of the Fire-Boltt Artillery Smart Watch NJ-R6E-10.3. Successful exploitation can cause the device to crash or become unresponsive, resulting in a Denial of Service (DoS). This can disrupt the normal functioning of the smart watch, potentially affecting users who rely on it for health monitoring, notifications, or other critical functions. While the confidentiality impact is limited, the loss of availability can degrade user experience and trust in the device. For organizations deploying these devices at scale, such as in corporate wellness programs or healthcare monitoring, this vulnerability could lead to operational disruptions. The lack of required privileges and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation in environments where attackers can be in Bluetooth range. Although no exploits are currently known in the wild, the vulnerability poses a significant risk until mitigations or patches are applied.

Mitigation Recommendations

1. Restrict Bluetooth Low Energy (BLE) access by configuring the smart watch and paired devices to only allow connections from trusted devices. 2. Disable unnecessary BLE services or features on the Fire-Boltt Artillery Smart Watch NJ-R6E-10.3 to reduce the attack surface. 3. Monitor for firmware updates or security patches from Fire-Boltt and apply them promptly once available. 4. Implement physical security controls to limit attacker proximity to devices, as exploitation requires Bluetooth range access. 5. Educate users about the risks of connecting to unknown or untrusted Bluetooth devices. 6. In environments with high security requirements, consider disabling BLE functionality entirely if not needed. 7. Network administrators should monitor Bluetooth traffic for unusual activity indicative of exploitation attempts. 8. Engage with the vendor to encourage timely patch development and disclosure of mitigation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d02b7ef31ef0b56c3de

Added to database: 2/25/2026, 9:43:30 PM

Last enriched: 2/26/2026, 8:40:57 AM

Last updated: 4/12/2026, 7:55:04 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses