Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10456: Integer Overflow or Wraparound in zephyrproject-rtos Zephyr

0
High
VulnerabilityCVE-2025-10456cvecve-2025-10456
Published: Fri Sep 19 2025 (09/19/2025, 05:21:33 UTC)
Source: CVE Database V5
Vendor/Project: zephyrproject-rtos
Product: Zephyr

Description

A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT). Specifically, an attacker could exploit a flaw that causes the BLE target (i.e., the device under attack) to attempt to disconnect a fixed channel, which is not allowed per the Bluetooth specification. This leads to undefined behavior, including potential assertion failures, crashes, or memory corruption, depending on the BLE stack implementation.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:30:45 UTC

Technical Analysis

CVE-2025-10456 is a high-severity vulnerability affecting the Zephyr real-time operating system (RTOS), specifically in its Bluetooth Low Energy (BLE) stack implementation. The flaw arises from improper handling of BLE fixed channels such as SMP (Security Manager Protocol) or ATT (Attribute Protocol). According to the Bluetooth specification, fixed channels must not be disconnected by the target device. However, due to an integer overflow or wraparound bug in Zephyr's BLE stack, an attacker can trigger the device to attempt disconnection of these fixed channels. This results in undefined behavior that may manifest as assertion failures, system crashes, or memory corruption, depending on the specific BLE stack implementation and runtime conditions. The vulnerability does not require user interaction or privileges and can be exploited remotely over the BLE interface. The CVSS v3.1 score is 7.1, reflecting a high severity primarily due to the potential for denial of service (availability impact) and integrity issues caused by memory corruption. No known exploits are currently reported in the wild, but the vulnerability affects all versions of Zephyr, indicating a broad attack surface among embedded and IoT devices using this RTOS. The lack of patch links suggests that fixes may still be pending or recently released but not yet widely disseminated.

Potential Impact

For European organizations, the impact of CVE-2025-10456 can be significant, especially those deploying IoT devices, embedded systems, or industrial control systems running Zephyr RTOS with BLE capabilities. The vulnerability can lead to device crashes or unstable behavior, causing denial of service in critical systems such as medical devices, smart meters, automotive components, or industrial sensors. Memory corruption could potentially be leveraged for further exploitation, though no such exploits are currently known. Disruption of BLE communications may also affect operational continuity and safety in environments relying on wireless sensor networks. Given the increasing adoption of Zephyr in European smart infrastructure and industrial automation, this vulnerability poses a risk to confidentiality indirectly (via potential memory corruption), integrity (due to corrupted BLE communications), and availability (due to crashes). The remote and unauthenticated nature of the exploit increases risk, as attackers can target devices without physical access or user interaction.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Inventory all devices and systems using Zephyr RTOS with BLE functionality to identify affected assets. 2) Monitor Zephyr project repositories and security advisories closely for official patches addressing CVE-2025-10456 and apply them promptly once available. 3) Until patches are deployed, consider disabling BLE functionality on affected devices where feasible, or restrict BLE communications to trusted environments using network segmentation and BLE access controls. 4) Implement runtime protections such as memory corruption detection and watchdog timers to mitigate crash impacts. 5) Employ BLE traffic monitoring and anomaly detection to identify suspicious attempts to exploit fixed channel disconnection. 6) Collaborate with device manufacturers and vendors to ensure timely firmware updates and security support. 7) For critical infrastructure, establish incident response plans that include procedures for handling BLE-related disruptions. These measures go beyond generic advice by focusing on asset identification, proactive patch management, network-level controls, and operational readiness specific to BLE and Zephyr RTOS environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zephyr
Date Reserved
2025-09-15T05:10:24.872Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cd76f94b8a032c4faa6399

Added to database: 9/19/2025, 3:30:01 PM

Last enriched: 9/19/2025, 3:30:45 PM

Last updated: 11/4/2025, 8:08:44 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats