Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20702: CWE-306 Missing Authentication for Critical Function in Airoha Technology Corp. AB156x, AB157x, AB158x, AB159x series, AB1627

0
High
VulnerabilityCVE-2025-20702cvecve-2025-20702cwe-306
Published: Mon Aug 04 2025 (08/04/2025, 06:20:40 UTC)
Source: CVE Database V5
Vendor/Project: Airoha Technology Corp.
Product: AB156x, AB157x, AB158x, AB159x series, AB1627

Description

In the Airoha Bluetooth audio SDK, there is a possible unauthorized access to the RACE protocol. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:28:43 UTC

Technical Analysis

CVE-2025-20702 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) found in Airoha Technology Corp.'s Bluetooth audio SDK, specifically impacting the AB156x, AB157x, AB158x, AB159x series, and AB1627 chipsets. The vulnerability arises from the RACE protocol implementation, which lacks proper authentication mechanisms for critical functions. This flaw permits an attacker to remotely access and execute privileged commands without any authentication, user interaction, or prior execution privileges. The affected SDK versions include Airoha IoT SDK for BT audio v5.5.0 and earlier, and Airoha AB1561x/AB1562x/AB1563x SDK v3.3.1 and earlier. The vulnerability has a CVSS v3.1 base score of 8.8, indicating high severity, with attack vector being adjacent network (Bluetooth), low attack complexity, no privileges required, and no user interaction needed. The impact encompasses full compromise of confidentiality, integrity, and availability of the affected devices. Although no known exploits are currently in the wild, the vulnerability’s characteristics make it a critical concern for Bluetooth-enabled IoT and audio devices using these chipsets. The lack of authentication in the RACE protocol could allow attackers to escalate privileges remotely, potentially leading to device takeover, data leakage, or denial of service.

Potential Impact

The vulnerability poses a significant risk to organizations deploying devices based on the affected Airoha chipsets, particularly in IoT and Bluetooth audio sectors. Successful exploitation could lead to unauthorized remote control over devices, enabling attackers to escalate privileges, manipulate device functions, exfiltrate sensitive data, or disrupt device availability. This could impact consumer electronics manufacturers, enterprise IoT deployments, and critical infrastructure relying on Bluetooth audio communication. The absence of user interaction and low attack complexity increase the likelihood of exploitation in real-world scenarios. Compromised devices could serve as entry points for broader network intrusions or be leveraged in large-scale attacks such as botnets. The widespread use of these chipsets in various regions amplifies the potential global impact, affecting supply chains and end-user security.

Mitigation Recommendations

Organizations should immediately inventory devices and products using the affected Airoha chipsets and SDK versions. Although no official patches are currently linked, monitoring vendor advisories for updates is critical. Until patches are available, mitigating exposure by restricting Bluetooth access to trusted devices and environments is essential. Implement network segmentation to isolate vulnerable devices and employ Bluetooth monitoring tools to detect anomalous RACE protocol activity. Where feasible, disable or limit RACE protocol usage. Device manufacturers should prioritize developing and deploying firmware updates that enforce robust authentication for critical functions within the RACE protocol. Additionally, incorporating runtime integrity checks and anomaly detection on Bluetooth communications can help identify exploitation attempts. Security teams should also educate users about the risks of connecting to untrusted Bluetooth devices and enforce strict device pairing policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.382Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68905789ad5a09ad00def642

Added to database: 8/4/2025, 6:47:37 AM

Last enriched: 2/27/2026, 12:28:43 AM

Last updated: 3/25/2026, 7:19:44 PM

Views: 552

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses