Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4321: CWE-240 Improper Handling of Inconsistent Structural Elements in silabs.com RS9116W

0
High
VulnerabilityCVE-2025-4321cvecve-2025-4321cwe-240cwe-617
Published: Mon Nov 17 2025 (11/17/2025, 14:58:33 UTC)
Source: CVE Database V5
Vendor/Project: silabs.com
Product: RS9116W

Description

In a Bluetooth device, using RS9116-WiseConnect SDK experiences a Denial of Service, if it receives malformed L2CAP packets, only hard reset will bring the device to normal operation

AI-Powered Analysis

AILast updated: 11/17/2025, 15:22:55 UTC

Technical Analysis

CVE-2025-4321 is a vulnerability identified in the silabs.com RS9116W Bluetooth device, specifically within the RS9116-WiseConnect SDK. The root cause is improper handling of inconsistent structural elements in the Bluetooth L2CAP protocol layer, classified under CWE-240 (Improper Handling of Inconsistent Structural Elements) and CWE-617 (Reachable Assertion). When the device receives malformed L2CAP packets, it triggers a Denial of Service (DoS) condition that causes the device to become unresponsive until a hard reset is performed. The vulnerability is exploitable remotely over Bluetooth without any authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N). The CVSS score of 7.1 reflects a high severity due to the significant impact on availability (VA:H) and ease of exploitation. The lack of known exploits in the wild suggests it is a recently disclosed issue, but the potential for disruption in Bluetooth-enabled devices is considerable. The affected product, RS9116W, is commonly used in embedded systems and IoT devices that rely on Bluetooth connectivity, making this a concern for environments where device uptime is critical. No patches have been published yet, emphasizing the need for proactive mitigation strategies.

Potential Impact

The primary impact of this vulnerability is a Denial of Service condition that renders affected Bluetooth devices inoperable until a hard reset is performed. For European organizations, this can disrupt operations relying on Bluetooth communications, such as industrial automation, healthcare devices, smart building systems, and other IoT deployments. The inability to remotely recover the device without physical intervention increases operational costs and downtime. In critical infrastructure sectors, such disruptions could lead to safety risks or loss of service continuity. Additionally, repeated exploitation attempts could degrade trust in Bluetooth-enabled systems and complicate incident response. The vulnerability's ease of exploitation without authentication or user interaction broadens the attack surface, especially in environments with many Bluetooth-enabled devices. While no data confidentiality or integrity impacts are reported, the availability impact alone justifies urgent attention.

Mitigation Recommendations

1. Monitor silabs.com and related security advisories closely for official patches or firmware updates addressing CVE-2025-4321 and apply them promptly once available. 2. Implement Bluetooth network segmentation and filtering to restrict access to RS9116W devices only to trusted sources, reducing exposure to malformed packets. 3. Employ anomaly detection systems capable of identifying unusual Bluetooth L2CAP traffic patterns indicative of malformed packet attacks. 4. Where feasible, disable unnecessary Bluetooth functionality or restrict device discoverability to minimize attack vectors. 5. Develop operational procedures for rapid physical access and hard reset of affected devices to minimize downtime if exploitation occurs. 6. Engage with device vendors to understand timelines for patch releases and request interim mitigations or workarounds. 7. Conduct regular security assessments of Bluetooth-enabled infrastructure to identify and remediate vulnerable devices proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Silabs
Date Reserved
2025-05-05T14:27:13.780Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691b3a49c14a66f6d6c9eb93

Added to database: 11/17/2025, 3:07:53 PM

Last enriched: 11/17/2025, 3:22:55 PM

Last updated: 11/18/2025, 10:18:27 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats