Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48981: n/a

0
High
VulnerabilityCVE-2024-48981cvecve-2024-48981
Published: Wed Nov 20 2024 (11/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet header by looking up the identifying first byte and matching it against a table of possible lengths. The initial parsing function, hciTrSerialRxIncoming does not drop packets with invalid identifiers but also does not set a safe default for the length of unknown packets' headers, leading to a buffer overflow. This can be leveraged into an arbitrary write by an attacker. It is possible to overwrite the pointer to a not-yet-allocated buffer that is supposed to receive the contents of the packet body. One can then overwrite the state variable used by the function to determine which state of packet parsing is currently occurring. Because the buffer is allocated when the last byte of the header has been copied, the combination of having a bad header length variable that will never match the counter variable and being able to overwrite the state variable with the resulting buffer overflow can be used to advance the function to the next step while skipping the buffer allocation and resulting pointer write. The next 16 bytes from the packet body are then written wherever the corrupted data pointer is pointing.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:48:48 UTC

Technical Analysis

The vulnerability CVE-2024-48981 affects MBed OS version 6.16.0, specifically in the processing of Host Controller Interface (HCI) packets. The vulnerable function, hciTrSerialRxIncoming, dynamically determines the length of the packet header by inspecting the first byte and matching it against a predefined table of possible header lengths. However, if the first byte is an invalid identifier, the function neither drops the packet nor sets a safe default header length. This leads to a buffer overflow condition. The overflow enables an attacker to overwrite a pointer intended for a buffer that has not yet been allocated to hold the packet body. Additionally, the attacker can overwrite a state variable that controls the packet parsing state machine. By corrupting this state variable, the function can be tricked into skipping buffer allocation and advancing parsing prematurely. Consequently, the next 16 bytes of the packet body are written to an arbitrary memory location pointed to by the corrupted pointer. This arbitrary write can be leveraged to manipulate program flow or corrupt critical data structures, potentially leading to remote code execution or system compromise. The vulnerability requires no privileges or user interaction, and the attack surface includes any device running the affected MBed OS version that processes HCI packets, commonly used in Bluetooth communications. The CVSS 3.1 base score of 7.5 reflects the network attack vector, low complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No patches or known exploits are currently documented, but the issue is critical for embedded devices relying on MBed OS for Bluetooth or similar protocols.

Potential Impact

This vulnerability poses a significant risk to organizations deploying embedded devices running MBed OS 6.16.0 that handle HCI packets, such as Bluetooth-enabled IoT devices, wearables, industrial controllers, and other connected hardware. Exploitation can lead to arbitrary memory writes, enabling attackers to corrupt device memory, alter control flow, or execute malicious code remotely without authentication. This can result in device malfunction, unauthorized control, data integrity breaches, or pivoting into internal networks. Given the widespread use of MBed OS in IoT and embedded systems, the impact spans multiple industries including healthcare, manufacturing, consumer electronics, and telecommunications. The lack of confidentiality impact reduces risk of data leakage but the high integrity impact threatens device reliability and trustworthiness. The vulnerability’s network accessibility and no requirement for user interaction increase the likelihood of exploitation in hostile environments. Organizations relying on these devices may face operational disruptions, safety hazards, and reputational damage if exploited. The absence of known exploits currently provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

To mitigate CVE-2024-48981, organizations should first monitor MBed OS vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. In the interim, implement strict network-level controls to limit exposure of vulnerable devices, such as isolating Bluetooth or HCI interfaces from untrusted networks and disabling unnecessary Bluetooth services. Employ intrusion detection systems capable of monitoring anomalous HCI packet traffic patterns indicative of exploitation attempts. Conduct thorough code reviews and testing of custom MBed OS integrations to identify and patch similar unsafe packet parsing logic. Where feasible, implement application-layer validation to reject malformed or unexpected HCI packets before they reach vulnerable parsing functions. Device manufacturers should consider adding runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) to reduce exploitation success. Finally, maintain an inventory of all devices running MBed OS 6.16.0 to prioritize risk assessment and remediation efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b7eb7ef31ef0b555e90

Added to database: 2/25/2026, 9:37:02 PM

Last enriched: 2/27/2026, 9:48:48 PM

Last updated: 4/12/2026, 2:38:10 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses