CVE-2025-26438
In · In Multiple Products
**A high-severity vulnerability exists in the SMP (Security Manager Protocol) implementation of multiple products, potentially allowing an attacker to bypass security mechanisms or cause a denial of s.
Executive summary
A high-severity vulnerability exists in the SMP (Security Manager Protocol) implementation of multiple products, potentially allowing an attacker to bypass security mechanisms or cause a denial of service.
Vulnerability
An unspecified vulnerability exists within the smp_process_secure_connection_oob_data function. This suggests a flaw in the handling of out-of-band data during the Bluetooth pairing process, which could be exploited by an attacker within radio range to compromise the secure connection establishment.
Business impact
Exploitation of this flaw could allow an attacker to bypass authentication, pair with a device without authorization, or potentially inject malicious data, leading to information disclosure or a denial-of-service condition. The CVSS score of 8.8 (High) indicates a critical flaw in a core security function that could undermine the confidentiality and integrity of communications for affected devices.
Remediation
Immediate Action: Apply the security updates provided by the vendor immediately to patch the vulnerable component.
Proactive Monitoring: Monitor Bluetooth communication logs, if available, for anomalous pairing attempts or connection failures. Investigate any reports of unexpected device behavior during pairing.
Compensating Controls: If patching is not immediately possible, disable Bluetooth functionality on affected devices or restrict pairing to physically secure environments to limit the attack surface.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The high severity of this vulnerability warrants immediate attention. The potential for an attacker to compromise secure communications represents a significant risk. Organizations must prioritize the deployment of vendor patches to all affected systems to prevent potential exploitation.