Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12035: Integer Overflow or Wraparound in zephyrproject-rtos Zephyr

0
Medium
VulnerabilityCVE-2025-12035cvecve-2025-12035
Published: Mon Dec 15 2025 (12/15/2025, 19:42:42 UTC)
Source: CVE Database V5
Vendor/Project: zephyrproject-rtos
Product: Zephyr

Description

An integer overflow condition exists in Bluetooth Host stack, within the bt_br_acl_recv routine a critical path for processing inbound BR/EDR L2CAP traffic.

AI-Powered Analysis

AILast updated: 12/15/2025, 21:02:09 UTC

Technical Analysis

CVE-2025-12035 is an integer overflow vulnerability identified in the Zephyr RTOS Bluetooth Host stack, specifically in the bt_br_acl_recv routine responsible for processing inbound Basic Rate/Enhanced Data Rate (BR/EDR) Logical Link Control and Adaptation Protocol (L2CAP) traffic. The vulnerability arises from improper handling of integer values, leading to an overflow or wraparound condition. This flaw can cause memory corruption or unexpected behavior, resulting in a denial of service (DoS) by crashing the Bluetooth stack or the entire device. The vulnerability is exploitable remotely over Bluetooth without requiring any authentication or user interaction, increasing the risk profile. The CVSS v3.1 score is 6.5 (medium severity), reflecting the high impact on availability but no direct impact on confidentiality or integrity. Zephyr RTOS is an open-source real-time operating system widely used in embedded systems and IoT devices, including industrial controllers, automotive systems, and consumer electronics. Since all versions are affected, devices running any version of Zephyr are potentially vulnerable. No public exploits have been reported yet, but the ease of remote exploitation over Bluetooth makes this a significant concern for embedded device security.

Potential Impact

For European organizations, the primary impact of CVE-2025-12035 is the potential for denial of service on devices running Zephyr RTOS with Bluetooth BR/EDR capabilities. This can disrupt critical embedded systems in industrial automation, automotive telematics, smart city infrastructure, and consumer IoT devices. The availability disruption could lead to operational downtime, safety risks in automotive or industrial environments, and increased maintenance costs. Since Zephyr is used in safety-critical and mission-critical applications, even temporary outages can have significant consequences. The lack of confidentiality or integrity impact reduces the risk of data breaches, but service interruptions can affect business continuity and safety compliance. European sectors with heavy reliance on embedded Bluetooth-enabled devices are particularly vulnerable, especially where remote physical access is limited and Bluetooth is the primary communication channel.

Mitigation Recommendations

1. Monitor Zephyr project communications and apply official patches promptly once released to address CVE-2025-12035. 2. Implement strict input validation and boundary checks in the Bluetooth stack to prevent integer overflow conditions. 3. Employ Bluetooth traffic filtering and segmentation to limit exposure to untrusted devices, especially in industrial and automotive environments. 4. Disable BR/EDR Bluetooth functionality on devices where it is not required to reduce attack surface. 5. Conduct thorough testing and fuzzing of Bluetooth input handling routines to detect similar vulnerabilities proactively. 6. Use network segmentation and access controls to isolate vulnerable embedded devices from critical infrastructure. 7. Maintain up-to-date asset inventories to identify all Zephyr-based devices and prioritize remediation efforts. 8. Educate operational technology (OT) and embedded system teams about the risks of Bluetooth vulnerabilities and best practices for secure configuration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
zephyr
Date Reserved
2025-10-21T17:37:08.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69407362d9bcdf3f3d00c448

Added to database: 12/15/2025, 8:45:22 PM

Last enriched: 12/15/2025, 9:02:09 PM

Last updated: 12/16/2025, 5:31:37 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats