Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62235: CWE-290 Authentication Bypass by Spoofing in Apache Software Foundation Apache Mynewt NimBLE

0
High
VulnerabilityCVE-2025-62235cvecve-2025-62235cwe-290
Published: Sat Jan 10 2026 (01/10/2026, 09:42:30 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Mynewt NimBLE

Description

Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 01/18/2026, 07:41:18 UTC

Technical Analysis

CVE-2025-62235 is an authentication bypass vulnerability classified under CWE-290 affecting Apache Mynewt NimBLE, a Bluetooth Low Energy (BLE) stack used in embedded and IoT devices. The vulnerability arises when the NimBLE stack processes a specially crafted Security Request packet. This packet can trick the system into removing the original bond between two BLE devices and establishing a new bond with an attacker-controlled device. This spoofing attack effectively allows the attacker to impersonate a trusted device, bypassing authentication mechanisms. The flaw affects all versions up to 1.8.0 and was addressed in version 1.9.0. The CVSS v3.1 score is 8.1 (high), reflecting that the attack vector is adjacent network (Bluetooth), requires no privileges or user interaction, and impacts confidentiality and integrity severely, though availability remains unaffected. The vulnerability can be exploited remotely over BLE without authentication, making it a significant risk for devices relying on secure BLE communications for sensitive data or control commands. No known exploits are reported in the wild yet, but the potential for misuse in IoT environments is considerable due to the widespread use of NimBLE in embedded systems.

Potential Impact

For European organizations, this vulnerability poses a serious risk to the confidentiality and integrity of data transmitted over BLE connections, particularly in sectors such as manufacturing, healthcare, smart buildings, and automotive where BLE-enabled IoT devices are prevalent. An attacker exploiting this flaw could impersonate legitimate devices, gaining unauthorized access to sensitive information or control over critical systems. This could lead to data breaches, unauthorized command execution, or manipulation of device behavior. The lack of impact on availability reduces the risk of denial-of-service, but the stealthy nature of the attack increases the difficulty of detection. Organizations relying on BLE for secure communications must consider the risk of espionage, sabotage, or data theft. The vulnerability also undermines trust in BLE device ecosystems, potentially affecting supply chains and operational continuity.

Mitigation Recommendations

The primary mitigation is to upgrade all affected Apache Mynewt NimBLE instances to version 1.9.0 or later, which contains the fix for this vulnerability. Organizations should conduct an inventory of all BLE-enabled devices using NimBLE to identify vulnerable systems. For devices where upgrading NimBLE is not immediately possible, network-level controls such as restricting BLE communication range or implementing BLE device whitelisting can reduce exposure. Monitoring BLE traffic for unusual bonding requests or repeated Security Requests may help detect exploitation attempts. Additionally, organizations should review and strengthen BLE security policies, including enforcing strong pairing methods and regularly auditing device bonds. Collaboration with device manufacturers to ensure timely firmware updates is critical. Finally, integrating BLE security events into centralized logging and SIEM systems can improve incident response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-10-09T15:28:28.169Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69622254545d6fe9682dfbb0

Added to database: 1/10/2026, 9:56:36 AM

Last enriched: 1/18/2026, 7:41:18 AM

Last updated: 2/7/2026, 4:38:06 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats