|
|
Message-ID: <8d46334b-72ff-5df4-3e2a-751f5e47d96e@apache.org> Date: Thu, 08 Jan 2026 09:50:31 +0000 From: Szymon Janc <janc@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-52435: Apache NimBLE: Invalid error handling in pause encryption procedure in NimBLE controller Severity: important Affected versions: - Apache NimBLE through 1.8.0 Description: J2EE Misconfiguration: Data Transmission Without Encryption vulnerability in Apache NimBLE. Improper handling of Pause Encryption procedure on Link Layer results in a previously encrypted connection being left in un-encrypted state allowing an eavesdropper to observe the remainder of the exchange. This issue affects Apache NimBLE: through <= 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue. Credit: Henrik Schnor <henrik.schnor@...lbox.org> (reporter) References: https://github.com/apache/mynewt-nimble/commit/164f1c23c18a290908df76ed83fe848bfe4a4903 https://github.com/apache/mynewt-nimble/commit/ec3d75e909fa6dcadf1836fefc4432794a673d18 https://mynewt.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-52435
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.