Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23050: CWE-125 Out-of-bounds Read in Qt

0
Low
VulnerabilityCVE-2025-23050cvecve-2025-23050cwe-125
Published: Fri Oct 31 2025 (10/31/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Qt
Product: Qt

Description

QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2.

AI-Powered Analysis

AILast updated: 10/31/2025, 02:10:49 UTC

Technical Analysis

CVE-2025-23050 is a vulnerability identified in the Qt framework's QLowEnergyController component, which handles Bluetooth Low Energy (BLE) communications. Specifically, versions of Qt before 5.15.19, 6.5.9, and 6.8.2 improperly process malformed Bluetooth Attribute Protocol (ATT) commands. This mishandling leads to an out-of-bounds read or a division by zero error, categorized under CWE-125 (Out-of-bounds Read). The vulnerability arises when the QLowEnergyController receives crafted ATT packets that exploit insufficient bounds checking, causing the application to read memory outside the intended buffer or perform invalid arithmetic operations. Such behavior can result in application crashes or denial of service conditions. The CVSS v3.1 score is 3.1, reflecting low severity due to the requirement of adjacent network access (Bluetooth), high attack complexity, no privileges required, and no user interaction needed. The vulnerability does not compromise confidentiality or integrity but impacts availability by potentially crashing the affected application or device. No public exploits have been reported, and the issue was reserved in early 2025 and published in October 2025. The flaw is fixed in Qt versions 5.15.19, 6.5.9, and 6.8.2, and users are advised to upgrade accordingly. This vulnerability is particularly relevant for applications and embedded systems relying on Qt for BLE communications, including IoT devices, industrial control systems, and consumer electronics.

Potential Impact

For European organizations, the primary impact of CVE-2025-23050 is the potential for denial of service in Bluetooth-enabled applications or devices using vulnerable Qt versions. This could disrupt critical operations in sectors relying on BLE communications, such as manufacturing automation, healthcare devices, smart building systems, and consumer electronics. While the vulnerability does not allow data leakage or unauthorized control, service interruptions could affect operational continuity and user experience. In industrial environments where BLE is used for sensor data collection or device management, repeated crashes could lead to downtime or require manual intervention. The low CVSS score indicates limited risk of widespread exploitation, but organizations with large deployments of embedded Qt-based systems should consider the cumulative impact. Additionally, the vulnerability could be leveraged as part of multi-stage attacks aiming to degrade system availability. European companies developing or deploying Qt-based BLE applications must assess their exposure and patch vulnerable components to maintain reliability and compliance with operational standards.

Mitigation Recommendations

To mitigate CVE-2025-23050, European organizations should: 1) Immediately upgrade Qt to versions 5.15.19, 6.5.9, or 6.8.2 or later, where the vulnerability is fixed. 2) Audit all applications and embedded devices using Qt for BLE communications to identify vulnerable versions. 3) Implement strict input validation and sanitization of Bluetooth ATT commands at the application or firmware level to prevent malformed packets from triggering the flaw. 4) Employ network segmentation and Bluetooth access controls to limit exposure to untrusted devices, reducing the risk of malicious ATT command injection. 5) Monitor device logs and application behavior for signs of crashes or abnormal Bluetooth activity that could indicate exploitation attempts. 6) Coordinate with device manufacturers and software vendors to ensure timely patch deployment and firmware updates. 7) Incorporate vulnerability scanning and patch management processes specifically targeting embedded and IoT devices using Qt. These targeted actions go beyond generic advice by focusing on the Bluetooth ATT protocol handling and the specific Qt versions affected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-01-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69041725aebfcd5474f35bd5

Added to database: 10/31/2025, 1:55:49 AM

Last enriched: 10/31/2025, 2:10:49 AM

Last updated: 10/31/2025, 10:06:18 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats