Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65828: n/a

0
Medium
VulnerabilityCVE-2025-65828cvecve-2025-65828
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.

AI-Powered Analysis

AILast updated: 12/19/2025, 04:17:21 UTC

Technical Analysis

CVE-2025-65828 is a vulnerability in Meatmeet devices that utilize Bluetooth Low Energy (BLE) for communication. The flaw allows an unauthenticated attacker within BLE range to issue several commands—specifically shutdown, restart, and clear config—that result in a Denial of Service (DoS) condition. The 'clear config' command is particularly disruptive as it disassociates the device from its user, necessitating manual reconfiguration to restore functionality. This interrupts the device's ability to receive updates from the Meatmeet base station, which acts as a gateway to cloud services. The vulnerability stems from insufficient access control (CWE-306), allowing critical commands to be executed without authentication or user interaction. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of exploitation (no authentication or user interaction required) but limited by the need for physical proximity (BLE range). The impact is primarily availability-related, as confidentiality and integrity are not affected. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. This vulnerability poses a risk to environments where Meatmeet devices are deployed and accessible via BLE, potentially disrupting operations dependent on these devices.

Potential Impact

For European organizations, this vulnerability can cause operational disruptions due to device unavailability. Sectors relying on Meatmeet devices for critical functions—such as healthcare, manufacturing, or logistics—may experience interruptions in service or data updates, impacting business continuity. The requirement for physical proximity limits remote exploitation but increases risk in publicly accessible or poorly secured facilities. The denial of service could lead to delays, increased maintenance costs, and potential safety concerns if devices are part of monitoring or control systems. Additionally, the need for manual reconfiguration after a 'clear config' command could strain IT and operational teams, especially if multiple devices are targeted simultaneously. While confidentiality and integrity are not directly impacted, the availability degradation could indirectly affect organizational processes and compliance with service-level agreements or regulatory requirements.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict physical security controls to limit unauthorized access to areas where Meatmeet devices are deployed. BLE signal range can be minimized by adjusting device placement and using physical barriers to reduce exposure. Network segmentation should isolate Meatmeet devices from critical infrastructure and sensitive networks to contain potential disruptions. Monitoring BLE traffic for unusual command patterns can help detect exploitation attempts early. Where possible, disable unnecessary BLE functionality or restrict command acceptance to authenticated sessions through firmware updates or configuration changes. Organizations should engage with the device vendor to obtain patches or firmware updates addressing this vulnerability. Additionally, establishing rapid response procedures for device reconfiguration and recovery will reduce downtime if exploitation occurs. Regular security assessments and penetration testing focusing on wireless interfaces can identify and remediate similar risks proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939dceba97935729e77408b

Added to database: 12/10/2025, 8:49:47 PM

Last enriched: 12/19/2025, 4:17:21 AM

Last updated: 2/5/2026, 11:19:40 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats