Skip to main content

CVE-2025-35003: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Software Foundation Apache NuttX RTOS

Critical
VulnerabilityCVE-2025-35003cvecve-2025-35003cwe-119cwe-121
Published: Mon May 26 2025 (05/26/2025, 10:03:06 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache NuttX RTOS

Description

Improper Restriction of Operations within the Bounds of a Memory Buffer and Stack-based Buffer Overflow vulnerabilities were discovered in Apache NuttX RTOS Bluetooth Stack (HCI and UART components) that may result in system crash, denial of service, or arbitrary code execution, after receiving maliciously crafted packets. NuttX's Bluetooth HCI/UART stack users are advised to upgrade to version 12.9.0, which fixes the identified implementation issues. This issue affects Apache NuttX: from 7.25 before 12.9.0.

AI-Powered Analysis

AILast updated: 07/09/2025, 13:56:46 UTC

Technical Analysis

CVE-2025-35003 is a critical security vulnerability identified in the Apache NuttX Real-Time Operating System (RTOS), specifically within its Bluetooth stack components handling HCI (Host Controller Interface) and UART (Universal Asynchronous Receiver/Transmitter) communications. The vulnerability arises from improper restriction of operations within the bounds of a memory buffer, leading to stack-based buffer overflow conditions (CWE-119 and CWE-121). When the Bluetooth stack processes maliciously crafted packets, it can trigger these buffer overflows, potentially allowing an attacker to cause a system crash (denial of service) or execute arbitrary code on the affected device. This vulnerability affects all versions of Apache NuttX from 7.25 up to but not including 12.9.0, with the vendor recommending an upgrade to version 12.9.0 where the issue is resolved. The CVSS v3.1 base score is 9.8, indicating a critical severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N), making exploitation feasible remotely and without user involvement. The impact on confidentiality, integrity, and availability is high, as arbitrary code execution could allow full system compromise. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a significant threat to devices running vulnerable NuttX versions, especially those relying on Bluetooth communications.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for industries and sectors that deploy embedded systems and IoT devices running Apache NuttX RTOS. These include manufacturing automation, automotive systems, medical devices, telecommunications infrastructure, and smart city technologies. Exploitation could lead to denial of service, disrupting critical operations, or arbitrary code execution, potentially allowing attackers to gain control over embedded devices, pivot within networks, or exfiltrate sensitive data. Given the Bluetooth stack is involved, devices relying on wireless communication are at risk, increasing the attack surface. The disruption or compromise of such embedded systems could affect operational continuity, safety, and data privacy compliance under regulations like GDPR. Additionally, the critical severity and remote exploitability elevate the urgency for European organizations to address this vulnerability promptly to avoid potential operational and reputational damage.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all devices and systems running Apache NuttX RTOS versions 7.25 through 12.8.x, focusing on those utilizing Bluetooth HCI/UART components. 2) Prioritize upgrading these systems to Apache NuttX version 12.9.0 or later, where the vulnerability is patched. 3) For devices where immediate upgrade is not feasible, implement network-level controls to restrict or monitor Bluetooth traffic, especially from untrusted sources, to reduce exposure. 4) Employ intrusion detection/prevention systems capable of recognizing anomalous Bluetooth packet patterns indicative of exploitation attempts. 5) Conduct thorough testing post-upgrade to ensure system stability and confirm the vulnerability is mitigated. 6) Maintain an inventory of embedded devices and enforce strict patch management policies for RTOS components. 7) Collaborate with device manufacturers and suppliers to ensure timely firmware updates and security advisories are received and acted upon. 8) Educate operational technology (OT) and IoT security teams about the risks associated with Bluetooth vulnerabilities in embedded systems to enhance monitoring and incident response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-04-15T20:10:33.989Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 683440d80acd01a249285563

Added to database: 5/26/2025, 10:22:16 AM

Last enriched: 7/9/2025, 1:56:46 PM

Last updated: 8/8/2025, 6:21:03 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats