{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3329","assignerOrgId":"e2e69745-5e70-4e92-8431-deb5529a81ad","assignerShortName":"zephyr","dateUpdated":"2025-03-11T15:25:38.906Z","dateReserved":"2021-01-27T00:00:00.000Z","datePublished":"2023-02-26T00:00:00.000Z"},"containers":{"cna":{"title":"DOS: Incorrect handling of the initial HCI ACL_MTU handshake packet leads to crash of bluetooth host layer","datePublic":"2023-02-25T00:00:00.000Z","providerMetadata":{"orgId":"e2e69745-5e70-4e92-8431-deb5529a81ad","shortName":"zephyr","dateUpdated":"2023-02-26T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Lack of proper validation in HCI Host stack initialization can cause a crash of the bluetooth stack"}],"affected":[{"vendor":"zephyrproject-rtos","product":"zephyr","versions":[{"version":"unspecified","lessThanOrEqual":"v2.4","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-117"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"Improper Check or Handling of Exceptional Conditions (CWE-703)","cweId":"CWE-703"}]}],"source":{"defect":["https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-117"]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T16:53:17.491Z"},"title":"CVE Program Container","references":[{"url":"https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-117","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-11T15:25:34.489205Z","id":"CVE-2021-3329","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-11T15:25:38.906Z"}}]}}