Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67133: n/a

0
High
VulnerabilityCVE-2025-67133cvecve-2025-67133
Published: Fri Jan 09 2026 (01/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Hero Motocorp Vida V1 Pro 2.0.7 allows a local attacker to cause a denial of service via the BLE component

AI-Powered Analysis

AILast updated: 01/09/2026, 15:54:36 UTC

Technical Analysis

CVE-2025-67133 identifies a vulnerability in the Hero Motocorp Vida V1 Pro device running firmware version 2.0.7, specifically within its Bluetooth Low Energy (BLE) component. The vulnerability allows a local attacker—someone with physical or logical local access to the device—to trigger a denial of service condition. This DoS likely manifests as a crash or malfunction of the BLE subsystem, rendering BLE-dependent features inoperable. Since BLE is commonly used for device communication, connectivity, and telemetry, this disruption can impair device functionality and user experience. The vulnerability does not have an assigned CVSS score, no known exploits have been reported in the wild, and no patches or mitigation details have been published yet. The lack of remote exploitation capability limits the attack surface to local attackers, which may include insiders or individuals with temporary device access. The absence of detailed technical information such as the exact cause or exploit vector restricts deeper analysis, but the impact on availability is clear. Given the device's use in connected vehicle or IoT contexts, this vulnerability could affect operational continuity where BLE is critical.

Potential Impact

For European organizations, the primary impact of CVE-2025-67133 is a denial of service affecting the BLE functionality of Hero Motocorp Vida V1 Pro devices. This could disrupt vehicle telemetry, diagnostics, or user connectivity features relying on BLE, potentially degrading operational efficiency or user safety features. Organizations in automotive manufacturing, fleet management, or connected vehicle services that deploy these devices may experience service interruptions or increased maintenance overhead. While the vulnerability does not appear to compromise confidentiality or integrity, the loss of availability could have cascading effects in environments dependent on continuous device communication. The local access requirement reduces the risk of widespread remote attacks but raises concerns about insider threats or physical security lapses. The lack of patches means affected organizations must rely on compensating controls until vendor updates are available.

Mitigation Recommendations

Given the absence of published patches or detailed remediation guidance, European organizations should implement strict local access controls to prevent unauthorized physical or logical access to Hero Motocorp Vida V1 Pro devices. This includes securing devices in controlled environments, employing strong authentication mechanisms for local interfaces, and monitoring BLE activity for anomalies that could indicate exploitation attempts. Network segmentation can limit the impact of compromised devices on broader systems. Organizations should engage with Hero Motocorp for timely firmware updates and apply patches promptly once available. Additionally, conducting regular security audits and training personnel on the risks of local device access can reduce exploitation likelihood. Where possible, disabling BLE functionality when not required may serve as a temporary mitigation. Incident response plans should incorporate scenarios involving BLE DoS to ensure rapid recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6961214ef9fa58d9727fd82f

Added to database: 1/9/2026, 3:39:58 PM

Last enriched: 1/9/2026, 3:54:36 PM

Last updated: 1/10/2026, 4:06:02 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats