Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35003: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Software Foundation Apache NuttX RTOS

0
Critical
VulnerabilityCVE-2025-35003cvecve-2025-35003cwe-119cwe-121
Published: Mon May 26 2025 (05/26/2025, 10:03:06 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache NuttX RTOS

Description

Improper Restriction of Operations within the Bounds of a Memory Buffer and Stack-based Buffer Overflow vulnerabilities were discovered in Apache NuttX RTOS Bluetooth Stack (HCI and UART components) that may result in system crash, denial of service, or arbitrary code execution, after receiving maliciously crafted packets. NuttX's Bluetooth HCI/UART stack users are advised to upgrade to version 12.9.0, which fixes the identified implementation issues. This issue affects Apache NuttX: from 7.25 before 12.9.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:26:59 UTC

Technical Analysis

CVE-2025-35003 is a critical security vulnerability identified in the Apache NuttX Real-Time Operating System (RTOS), specifically within its Bluetooth stack implementations for HCI (Host Controller Interface) and UART (Universal Asynchronous Receiver/Transmitter) components. The root cause is improper restriction of operations within the bounds of a memory buffer, leading to stack-based buffer overflow conditions (CWE-119 and CWE-121). These flaws allow an attacker to send specially crafted Bluetooth packets that overflow internal buffers, corrupting memory and enabling arbitrary code execution or causing system crashes and denial of service. The vulnerability affects all Apache NuttX versions starting from 7.25 up to but not including the patched release 12.9.0. The exploitability is high due to the lack of required privileges, no user interaction needed, and the network attack vector via Bluetooth. The CVSS v3.1 base score is 9.8, reflecting critical impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the nature of the vulnerability and the widespread use of NuttX in embedded and IoT devices make it a significant threat. The Apache Software Foundation recommends immediate upgrading to version 12.9.0 to remediate these issues.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code, crash systems, or cause denial of service on devices running vulnerable versions of Apache NuttX RTOS Bluetooth stack. This can lead to complete compromise of embedded devices, loss of control, data breaches, or disruption of critical services. Given NuttX’s use in IoT, industrial control, and embedded environments, exploitation could impact a wide range of sectors including manufacturing, healthcare, automotive, and consumer electronics. The ability to execute code remotely without authentication increases the risk of widespread attacks, potentially enabling attackers to pivot within networks or disrupt operational technology. The impact extends to confidentiality, integrity, and availability, making this a critical threat to organizations relying on affected devices.

Mitigation Recommendations

1. Immediate upgrade to Apache NuttX RTOS version 12.9.0 or later, which contains patches addressing the buffer overflow vulnerabilities. 2. For devices where upgrading is not immediately feasible, implement network-level controls to restrict Bluetooth access to trusted devices only, using whitelisting or pairing restrictions. 3. Monitor Bluetooth traffic for anomalous or malformed packets that could indicate exploitation attempts. 4. Employ runtime protections such as stack canaries and address space layout randomization (ASLR) where supported by the device hardware and software environment. 5. Conduct thorough security testing and code audits on custom Bluetooth stack integrations to detect similar buffer handling issues. 6. Maintain an inventory of devices running NuttX RTOS to prioritize patch deployment and risk assessment. 7. Collaborate with device manufacturers and vendors to ensure timely firmware updates and security advisories are disseminated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-04-15T20:10:33.989Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 683440d80acd01a249285563

Added to database: 5/26/2025, 10:22:16 AM

Last enriched: 2/26/2026, 9:26:59 PM

Last updated: 3/24/2026, 4:22:59 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses