CVE-2025-23050: CWE-125 Out-of-bounds Read in Qt
QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2.
AI Analysis
Technical Summary
CVE-2025-23050 is a vulnerability identified in the Qt framework's QLowEnergyController component, which handles Bluetooth Low Energy (BLE) communications. Specifically, versions of Qt before 5.15.19, 6.5.9, and 6.8.2 improperly process malformed Bluetooth Attribute Protocol (ATT) commands. This mishandling leads to an out-of-bounds read or a division by zero error, categorized under CWE-125 (Out-of-bounds Read). The vulnerability arises when the QLowEnergyController receives crafted ATT packets that exploit insufficient bounds checking, causing the application to read memory outside the intended buffer or perform invalid arithmetic operations. Such behavior can result in application crashes or denial of service conditions. The CVSS v3.1 score is 3.1, reflecting low severity due to the requirement of adjacent network access (Bluetooth), high attack complexity, no privileges required, and no user interaction needed. The vulnerability does not compromise confidentiality or integrity but impacts availability by potentially crashing the affected application or device. No public exploits have been reported, and the issue was reserved in early 2025 and published in October 2025. The flaw is fixed in Qt versions 5.15.19, 6.5.9, and 6.8.2, and users are advised to upgrade accordingly. This vulnerability is particularly relevant for applications and embedded systems relying on Qt for BLE communications, including IoT devices, industrial control systems, and consumer electronics.
Potential Impact
For European organizations, the primary impact of CVE-2025-23050 is the potential for denial of service in Bluetooth-enabled applications or devices using vulnerable Qt versions. This could disrupt critical operations in sectors relying on BLE communications, such as manufacturing automation, healthcare devices, smart building systems, and consumer electronics. While the vulnerability does not allow data leakage or unauthorized control, service interruptions could affect operational continuity and user experience. In industrial environments where BLE is used for sensor data collection or device management, repeated crashes could lead to downtime or require manual intervention. The low CVSS score indicates limited risk of widespread exploitation, but organizations with large deployments of embedded Qt-based systems should consider the cumulative impact. Additionally, the vulnerability could be leveraged as part of multi-stage attacks aiming to degrade system availability. European companies developing or deploying Qt-based BLE applications must assess their exposure and patch vulnerable components to maintain reliability and compliance with operational standards.
Mitigation Recommendations
To mitigate CVE-2025-23050, European organizations should: 1) Immediately upgrade Qt to versions 5.15.19, 6.5.9, or 6.8.2 or later, where the vulnerability is fixed. 2) Audit all applications and embedded devices using Qt for BLE communications to identify vulnerable versions. 3) Implement strict input validation and sanitization of Bluetooth ATT commands at the application or firmware level to prevent malformed packets from triggering the flaw. 4) Employ network segmentation and Bluetooth access controls to limit exposure to untrusted devices, reducing the risk of malicious ATT command injection. 5) Monitor device logs and application behavior for signs of crashes or abnormal Bluetooth activity that could indicate exploitation attempts. 6) Coordinate with device manufacturers and software vendors to ensure timely patch deployment and firmware updates. 7) Incorporate vulnerability scanning and patch management processes specifically targeting embedded and IoT devices using Qt. These targeted actions go beyond generic advice by focusing on the Bluetooth ATT protocol handling and the specific Qt versions affected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-23050: CWE-125 Out-of-bounds Read in Qt
Description
QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-23050 is a vulnerability identified in the Qt framework's QLowEnergyController component, which handles Bluetooth Low Energy (BLE) communications. Specifically, versions of Qt before 5.15.19, 6.5.9, and 6.8.2 improperly process malformed Bluetooth Attribute Protocol (ATT) commands. This mishandling leads to an out-of-bounds read or a division by zero error, categorized under CWE-125 (Out-of-bounds Read). The vulnerability arises when the QLowEnergyController receives crafted ATT packets that exploit insufficient bounds checking, causing the application to read memory outside the intended buffer or perform invalid arithmetic operations. Such behavior can result in application crashes or denial of service conditions. The CVSS v3.1 score is 3.1, reflecting low severity due to the requirement of adjacent network access (Bluetooth), high attack complexity, no privileges required, and no user interaction needed. The vulnerability does not compromise confidentiality or integrity but impacts availability by potentially crashing the affected application or device. No public exploits have been reported, and the issue was reserved in early 2025 and published in October 2025. The flaw is fixed in Qt versions 5.15.19, 6.5.9, and 6.8.2, and users are advised to upgrade accordingly. This vulnerability is particularly relevant for applications and embedded systems relying on Qt for BLE communications, including IoT devices, industrial control systems, and consumer electronics.
Potential Impact
For European organizations, the primary impact of CVE-2025-23050 is the potential for denial of service in Bluetooth-enabled applications or devices using vulnerable Qt versions. This could disrupt critical operations in sectors relying on BLE communications, such as manufacturing automation, healthcare devices, smart building systems, and consumer electronics. While the vulnerability does not allow data leakage or unauthorized control, service interruptions could affect operational continuity and user experience. In industrial environments where BLE is used for sensor data collection or device management, repeated crashes could lead to downtime or require manual intervention. The low CVSS score indicates limited risk of widespread exploitation, but organizations with large deployments of embedded Qt-based systems should consider the cumulative impact. Additionally, the vulnerability could be leveraged as part of multi-stage attacks aiming to degrade system availability. European companies developing or deploying Qt-based BLE applications must assess their exposure and patch vulnerable components to maintain reliability and compliance with operational standards.
Mitigation Recommendations
To mitigate CVE-2025-23050, European organizations should: 1) Immediately upgrade Qt to versions 5.15.19, 6.5.9, or 6.8.2 or later, where the vulnerability is fixed. 2) Audit all applications and embedded devices using Qt for BLE communications to identify vulnerable versions. 3) Implement strict input validation and sanitization of Bluetooth ATT commands at the application or firmware level to prevent malformed packets from triggering the flaw. 4) Employ network segmentation and Bluetooth access controls to limit exposure to untrusted devices, reducing the risk of malicious ATT command injection. 5) Monitor device logs and application behavior for signs of crashes or abnormal Bluetooth activity that could indicate exploitation attempts. 6) Coordinate with device manufacturers and software vendors to ensure timely patch deployment and firmware updates. 7) Incorporate vulnerability scanning and patch management processes specifically targeting embedded and IoT devices using Qt. These targeted actions go beyond generic advice by focusing on the Bluetooth ATT protocol handling and the specific Qt versions affected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-10T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69041725aebfcd5474f35bd5
Added to database: 10/31/2025, 1:55:49 AM
Last enriched: 10/31/2025, 2:10:49 AM
Last updated: 10/31/2025, 10:06:18 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11843: CWE-290: Authentication Bypass by Spoofing in Therefore Corporation GmbH Therefore Online and Therefore On-Premises
HighCVE-2025-12115: CWE-602 Client-Side Enforcement of Server-Side Security in wpclever WPC Name Your Price for WooCommerce
HighCVE-2025-12041: CWE-862 Missing Authorization in apos37 ERI File Library
MediumCVE-2025-30189: Improper Preservation of Consistency Between Independent Representations of Shared State in Open-Xchange GmbH OX Dovecot Pro
HighCVE-2025-62232: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache APISIX
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.