Skip to main content

CVE-2024-7137: CWE-787 Out-of-bounds Write in silabs.com RS9116 Bluetooth SDK

Medium
VulnerabilityCVE-2024-7137cvecve-2024-7137cwe-787
Published: Thu Dec 19 2024 (12/19/2024, 19:23:01 UTC)
Source: CVE Database V5
Vendor/Project: silabs.com
Product: RS9116 Bluetooth SDK

Description

The L2CAP receive data buffer for L2CAP packets is restricted to packet sizes smaller than the maximum supported packet size. Receiving a packet that exceeds the restricted buffer length may cause a crash. A hard reset is required to recover the crashed device.

AI-Powered Analysis

AILast updated: 07/07/2025, 09:40:15 UTC

Technical Analysis

CVE-2024-7137 is a medium severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting the RS9116 Bluetooth SDK developed by silabs.com. The vulnerability arises in the handling of L2CAP (Logical Link Control and Adaptation Protocol) receive data buffers. Specifically, the SDK restricts the buffer size for incoming L2CAP packets to be smaller than the maximum supported packet size. However, if a packet exceeding this restricted buffer length is received, it can cause an out-of-bounds write condition. This memory corruption leads to a crash of the device running the vulnerable SDK, requiring a hard reset to recover. The CVSS v3.1 base score is 6.5, reflecting a medium severity with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating the attack requires adjacent network access, no privileges or user interaction, and impacts availability only. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects version 0 of the RS9116 Bluetooth SDK, which is used in embedded Bluetooth modules and IoT devices that rely on Silabs’ wireless connectivity solutions. The root cause is insufficient bounds checking on L2CAP packet sizes, a critical protocol layer in Bluetooth communications, which can be exploited by sending specially crafted oversized L2CAP packets to cause denial of service via device crashes.

Potential Impact

For European organizations deploying devices or systems using the RS9116 Bluetooth SDK, this vulnerability poses a risk of denial of service (DoS) attacks. The impact is primarily on availability, as the affected devices will crash and require a hard reset, potentially disrupting critical operations. This is particularly concerning for industries relying on embedded Bluetooth modules for automation, industrial control, healthcare devices, or smart infrastructure, where device downtime can lead to operational delays, safety risks, or financial losses. Since the attack vector requires adjacent network access (e.g., Bluetooth proximity), attackers need to be physically near the target device, which somewhat limits remote exploitation but does not eliminate risk in public or semi-public environments. The lack of required privileges or user interaction lowers the barrier for exploitation by nearby attackers. European organizations with IoT deployments, smart manufacturing, or medical device usage incorporating Silabs RS9116 modules should be aware of potential disruptions and plan accordingly.

Mitigation Recommendations

1. Monitor silabs.com and official channels for patches or firmware updates addressing CVE-2024-7137 and apply them promptly once available. 2. Implement network segmentation and access controls to limit Bluetooth connectivity exposure, especially in sensitive environments. 3. Employ Bluetooth device whitelisting and authentication mechanisms to restrict connections to trusted devices only. 4. Conduct regular device inventory and firmware version audits to identify affected RS9116 SDK deployments. 5. Where feasible, disable or restrict Bluetooth functionality on devices that do not require it to reduce attack surface. 6. For critical systems, consider deploying intrusion detection systems capable of monitoring anomalous Bluetooth traffic patterns indicative of oversized L2CAP packets. 7. Train operational staff to recognize and respond to device crashes potentially caused by this vulnerability, including procedures for safe hard resets and incident reporting. 8. Engage with Silabs support for guidance on interim mitigations or workarounds until official patches are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Silabs
Date Reserved
2024-07-26T18:12:34.369Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68371302182aa0cae24e8df4

Added to database: 5/28/2025, 1:43:30 PM

Last enriched: 7/7/2025, 9:40:15 AM

Last updated: 8/12/2025, 2:59:28 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats