Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62235: CWE-290 Authentication Bypass by Spoofing in Apache Software Foundation Apache Mynewt NimBLE

0
Unknown
VulnerabilityCVE-2025-62235cvecve-2025-62235cwe-290
Published: Sat Jan 10 2026 (01/10/2026, 09:42:30 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Mynewt NimBLE

Description

Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.

AI-Powered Analysis

AILast updated: 01/10/2026, 10:10:54 UTC

Technical Analysis

CVE-2025-62235 is a security vulnerability classified under CWE-290 (Authentication Bypass by Spoofing) affecting Apache Mynewt NimBLE, a Bluetooth Low Energy (BLE) stack widely used in embedded and IoT devices. The vulnerability exists in versions up to 1.8.0 and arises when the BLE stack processes a specially crafted Security Request packet. This crafted request can trigger the removal of the original bonding information between two BLE devices, effectively breaking the established trust relationship. Subsequently, the attacker can initiate a re-bonding process, impersonating the legitimate device and establishing a new bond with the victim device. This bypasses the normal authentication mechanisms intended to secure BLE communications. The flaw exploits weaknesses in the handling of bonding and security requests within the NimBLE stack, allowing an attacker in radio proximity to spoof a device and gain unauthorized access. The issue does not require user interaction but does require the attacker to be within BLE communication range. The Apache Software Foundation has addressed this vulnerability in version 1.9.0 of NimBLE, and users are strongly advised to upgrade. No public exploits have been reported, but the potential for misuse in IoT environments is significant given the widespread use of NimBLE in embedded systems, wearables, and industrial sensors.

Potential Impact

For European organizations, the impact of CVE-2025-62235 can be substantial, especially for sectors relying on BLE-enabled IoT devices such as manufacturing, healthcare, smart cities, and logistics. Successful exploitation can lead to unauthorized device access, data interception, and manipulation, undermining confidentiality and integrity of communications. This could facilitate further attacks, including lateral movement within networks or disruption of critical services. Industrial control systems and medical devices using NimBLE may be particularly vulnerable, risking operational disruption or patient safety. The proximity requirement limits remote exploitation but does not eliminate risk in environments with many BLE devices or public access areas. The vulnerability also poses risks to consumer privacy and data protection compliance under GDPR if personal data is compromised. Organizations may face reputational damage and regulatory penalties if breaches occur due to unpatched systems.

Mitigation Recommendations

To mitigate CVE-2025-62235, organizations should immediately upgrade all Apache Mynewt NimBLE implementations to version 1.9.0 or later, where the vulnerability is fixed. Firmware updates for embedded devices using NimBLE must be prioritized and tested for compatibility. Network segmentation should be employed to isolate BLE-enabled devices from critical infrastructure. Implement BLE device whitelisting and strict access controls to limit bonding to known devices only. Monitor BLE traffic for anomalous Security Requests indicative of spoofing attempts. Employ physical security measures to restrict attacker proximity to sensitive BLE devices. Regularly audit and inventory BLE-enabled devices to ensure all are running patched firmware. For new deployments, consider alternative BLE stacks with robust security track records. Finally, maintain incident response plans that include BLE-related attack scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-10-09T15:28:28.169Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69622254545d6fe9682dfbb0

Added to database: 1/10/2026, 9:56:36 AM

Last enriched: 1/10/2026, 10:10:54 AM

Last updated: 1/11/2026, 12:19:11 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats