CVE-2025-65828: n/a
An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.
AI Analysis
Technical Summary
CVE-2025-65828 is a vulnerability in Meatmeet devices that utilize Bluetooth Low Energy (BLE) for communication. The flaw allows an unauthenticated attacker within BLE range to issue several commands—specifically shutdown, restart, and clear config—that result in a Denial of Service (DoS) condition. The 'clear config' command is particularly disruptive as it disassociates the device from its user, necessitating manual reconfiguration to restore functionality. This interrupts the device's ability to receive updates from the Meatmeet base station, which acts as a gateway to cloud services. The vulnerability stems from insufficient access control (CWE-306), allowing critical commands to be executed without authentication or user interaction. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of exploitation (no authentication or user interaction required) but limited by the need for physical proximity (BLE range). The impact is primarily availability-related, as confidentiality and integrity are not affected. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. This vulnerability poses a risk to environments where Meatmeet devices are deployed and accessible via BLE, potentially disrupting operations dependent on these devices.
Potential Impact
For European organizations, this vulnerability can cause operational disruptions due to device unavailability. Sectors relying on Meatmeet devices for critical functions—such as healthcare, manufacturing, or logistics—may experience interruptions in service or data updates, impacting business continuity. The requirement for physical proximity limits remote exploitation but increases risk in publicly accessible or poorly secured facilities. The denial of service could lead to delays, increased maintenance costs, and potential safety concerns if devices are part of monitoring or control systems. Additionally, the need for manual reconfiguration after a 'clear config' command could strain IT and operational teams, especially if multiple devices are targeted simultaneously. While confidentiality and integrity are not directly impacted, the availability degradation could indirectly affect organizational processes and compliance with service-level agreements or regulatory requirements.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict physical security controls to limit unauthorized access to areas where Meatmeet devices are deployed. BLE signal range can be minimized by adjusting device placement and using physical barriers to reduce exposure. Network segmentation should isolate Meatmeet devices from critical infrastructure and sensitive networks to contain potential disruptions. Monitoring BLE traffic for unusual command patterns can help detect exploitation attempts early. Where possible, disable unnecessary BLE functionality or restrict command acceptance to authenticated sessions through firmware updates or configuration changes. Organizations should engage with the device vendor to obtain patches or firmware updates addressing this vulnerability. Additionally, establishing rapid response procedures for device reconfiguration and recovery will reduce downtime if exploitation occurs. Regular security assessments and penetration testing focusing on wireless interfaces can identify and remediate similar risks proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-65828: n/a
Description
An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.
AI-Powered Analysis
Technical Analysis
CVE-2025-65828 is a vulnerability in Meatmeet devices that utilize Bluetooth Low Energy (BLE) for communication. The flaw allows an unauthenticated attacker within BLE range to issue several commands—specifically shutdown, restart, and clear config—that result in a Denial of Service (DoS) condition. The 'clear config' command is particularly disruptive as it disassociates the device from its user, necessitating manual reconfiguration to restore functionality. This interrupts the device's ability to receive updates from the Meatmeet base station, which acts as a gateway to cloud services. The vulnerability stems from insufficient access control (CWE-306), allowing critical commands to be executed without authentication or user interaction. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of exploitation (no authentication or user interaction required) but limited by the need for physical proximity (BLE range). The impact is primarily availability-related, as confidentiality and integrity are not affected. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. This vulnerability poses a risk to environments where Meatmeet devices are deployed and accessible via BLE, potentially disrupting operations dependent on these devices.
Potential Impact
For European organizations, this vulnerability can cause operational disruptions due to device unavailability. Sectors relying on Meatmeet devices for critical functions—such as healthcare, manufacturing, or logistics—may experience interruptions in service or data updates, impacting business continuity. The requirement for physical proximity limits remote exploitation but increases risk in publicly accessible or poorly secured facilities. The denial of service could lead to delays, increased maintenance costs, and potential safety concerns if devices are part of monitoring or control systems. Additionally, the need for manual reconfiguration after a 'clear config' command could strain IT and operational teams, especially if multiple devices are targeted simultaneously. While confidentiality and integrity are not directly impacted, the availability degradation could indirectly affect organizational processes and compliance with service-level agreements or regulatory requirements.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict physical security controls to limit unauthorized access to areas where Meatmeet devices are deployed. BLE signal range can be minimized by adjusting device placement and using physical barriers to reduce exposure. Network segmentation should isolate Meatmeet devices from critical infrastructure and sensitive networks to contain potential disruptions. Monitoring BLE traffic for unusual command patterns can help detect exploitation attempts early. Where possible, disable unnecessary BLE functionality or restrict command acceptance to authenticated sessions through firmware updates or configuration changes. Organizations should engage with the device vendor to obtain patches or firmware updates addressing this vulnerability. Additionally, establishing rapid response procedures for device reconfiguration and recovery will reduce downtime if exploitation occurs. Regular security assessments and penetration testing focusing on wireless interfaces can identify and remediate similar risks proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6939dceba97935729e77408b
Added to database: 12/10/2025, 8:49:47 PM
Last enriched: 12/19/2025, 4:17:21 AM
Last updated: 2/5/2026, 11:19:40 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalCVE-2026-21532: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Azure Functions
HighCVE-2026-0391: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.