CVE-2025-10456: Integer Overflow or Wraparound in zephyrproject-rtos Zephyr
A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT). Specifically, an attacker could exploit a flaw that causes the BLE target (i.e., the device under attack) to attempt to disconnect a fixed channel, which is not allowed per the Bluetooth specification. This leads to undefined behavior, including potential assertion failures, crashes, or memory corruption, depending on the BLE stack implementation.
AI Analysis
Technical Summary
CVE-2025-10456 is a high-severity vulnerability affecting the Zephyr real-time operating system (RTOS), specifically in its Bluetooth Low Energy (BLE) stack implementation. The flaw arises from improper handling of BLE fixed channels such as SMP (Security Manager Protocol) or ATT (Attribute Protocol). According to the Bluetooth specification, fixed channels must not be disconnected by the target device. However, due to an integer overflow or wraparound bug in Zephyr's BLE stack, an attacker can trigger the device to attempt disconnection of these fixed channels. This results in undefined behavior that may manifest as assertion failures, system crashes, or memory corruption, depending on the specific BLE stack implementation and runtime conditions. The vulnerability does not require user interaction or privileges and can be exploited remotely over the BLE interface. The CVSS v3.1 score is 7.1, reflecting a high severity primarily due to the potential for denial of service (availability impact) and integrity issues caused by memory corruption. No known exploits are currently reported in the wild, but the vulnerability affects all versions of Zephyr, indicating a broad attack surface among embedded and IoT devices using this RTOS. The lack of patch links suggests that fixes may still be pending or recently released but not yet widely disseminated.
Potential Impact
For European organizations, the impact of CVE-2025-10456 can be significant, especially those deploying IoT devices, embedded systems, or industrial control systems running Zephyr RTOS with BLE capabilities. The vulnerability can lead to device crashes or unstable behavior, causing denial of service in critical systems such as medical devices, smart meters, automotive components, or industrial sensors. Memory corruption could potentially be leveraged for further exploitation, though no such exploits are currently known. Disruption of BLE communications may also affect operational continuity and safety in environments relying on wireless sensor networks. Given the increasing adoption of Zephyr in European smart infrastructure and industrial automation, this vulnerability poses a risk to confidentiality indirectly (via potential memory corruption), integrity (due to corrupted BLE communications), and availability (due to crashes). The remote and unauthenticated nature of the exploit increases risk, as attackers can target devices without physical access or user interaction.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Inventory all devices and systems using Zephyr RTOS with BLE functionality to identify affected assets. 2) Monitor Zephyr project repositories and security advisories closely for official patches addressing CVE-2025-10456 and apply them promptly once available. 3) Until patches are deployed, consider disabling BLE functionality on affected devices where feasible, or restrict BLE communications to trusted environments using network segmentation and BLE access controls. 4) Implement runtime protections such as memory corruption detection and watchdog timers to mitigate crash impacts. 5) Employ BLE traffic monitoring and anomaly detection to identify suspicious attempts to exploit fixed channel disconnection. 6) Collaborate with device manufacturers and vendors to ensure timely firmware updates and security support. 7) For critical infrastructure, establish incident response plans that include procedures for handling BLE-related disruptions. These measures go beyond generic advice by focusing on asset identification, proactive patch management, network-level controls, and operational readiness specific to BLE and Zephyr RTOS environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-10456: Integer Overflow or Wraparound in zephyrproject-rtos Zephyr
Description
A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT). Specifically, an attacker could exploit a flaw that causes the BLE target (i.e., the device under attack) to attempt to disconnect a fixed channel, which is not allowed per the Bluetooth specification. This leads to undefined behavior, including potential assertion failures, crashes, or memory corruption, depending on the BLE stack implementation.
AI-Powered Analysis
Technical Analysis
CVE-2025-10456 is a high-severity vulnerability affecting the Zephyr real-time operating system (RTOS), specifically in its Bluetooth Low Energy (BLE) stack implementation. The flaw arises from improper handling of BLE fixed channels such as SMP (Security Manager Protocol) or ATT (Attribute Protocol). According to the Bluetooth specification, fixed channels must not be disconnected by the target device. However, due to an integer overflow or wraparound bug in Zephyr's BLE stack, an attacker can trigger the device to attempt disconnection of these fixed channels. This results in undefined behavior that may manifest as assertion failures, system crashes, or memory corruption, depending on the specific BLE stack implementation and runtime conditions. The vulnerability does not require user interaction or privileges and can be exploited remotely over the BLE interface. The CVSS v3.1 score is 7.1, reflecting a high severity primarily due to the potential for denial of service (availability impact) and integrity issues caused by memory corruption. No known exploits are currently reported in the wild, but the vulnerability affects all versions of Zephyr, indicating a broad attack surface among embedded and IoT devices using this RTOS. The lack of patch links suggests that fixes may still be pending or recently released but not yet widely disseminated.
Potential Impact
For European organizations, the impact of CVE-2025-10456 can be significant, especially those deploying IoT devices, embedded systems, or industrial control systems running Zephyr RTOS with BLE capabilities. The vulnerability can lead to device crashes or unstable behavior, causing denial of service in critical systems such as medical devices, smart meters, automotive components, or industrial sensors. Memory corruption could potentially be leveraged for further exploitation, though no such exploits are currently known. Disruption of BLE communications may also affect operational continuity and safety in environments relying on wireless sensor networks. Given the increasing adoption of Zephyr in European smart infrastructure and industrial automation, this vulnerability poses a risk to confidentiality indirectly (via potential memory corruption), integrity (due to corrupted BLE communications), and availability (due to crashes). The remote and unauthenticated nature of the exploit increases risk, as attackers can target devices without physical access or user interaction.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Inventory all devices and systems using Zephyr RTOS with BLE functionality to identify affected assets. 2) Monitor Zephyr project repositories and security advisories closely for official patches addressing CVE-2025-10456 and apply them promptly once available. 3) Until patches are deployed, consider disabling BLE functionality on affected devices where feasible, or restrict BLE communications to trusted environments using network segmentation and BLE access controls. 4) Implement runtime protections such as memory corruption detection and watchdog timers to mitigate crash impacts. 5) Employ BLE traffic monitoring and anomaly detection to identify suspicious attempts to exploit fixed channel disconnection. 6) Collaborate with device manufacturers and vendors to ensure timely firmware updates and security support. 7) For critical infrastructure, establish incident response plans that include procedures for handling BLE-related disruptions. These measures go beyond generic advice by focusing on asset identification, proactive patch management, network-level controls, and operational readiness specific to BLE and Zephyr RTOS environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
 - 5.1
 - Assigner Short Name
 - zephyr
 - Date Reserved
 - 2025-09-15T05:10:24.872Z
 - Cvss Version
 - 3.1
 - State
 - PUBLISHED
 
Threat ID: 68cd76f94b8a032c4faa6399
Added to database: 9/19/2025, 3:30:01 PM
Last enriched: 9/19/2025, 3:30:45 PM
Last updated: 11/4/2025, 8:08:44 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.