Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

cypress

Source -

ADPNVD

BOS Name -

N/A

CNA CVEs -

0

ADP CVEs -

1

CISA CVEs -

0

NVD CVEs -

11
Related CVEsRelated ProductsRelated AssignersReports
12Vulnerabilities found

CVE-2023-47415
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-15.32% / 94.36%
||
7 Day CHG~0.00%
Published-07 Mar, 2024 | 00:00
Updated-29 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cypress Solutions CTM-200 v2.7.1.5600 and below was discovered to contain an OS command injection vulnerability via the cli_text parameter.

Action-Not Available
Vendor-n/acypress
Product-n/actm-200_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34147
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.44%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 06:26
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 does not properly handle the reception of a malformed LMP timing accuracy response followed by multiple reconnections to the link slave, allowing attackers to exhaust device BT resources and eventually trigger a crash via multiple attempts of sending a crafted LMP timing accuracy response followed by a sudden reconnection with a random BDAddress.

Action-Not Available
Vendor-cypressn/a
Product-cyw20735b1wireless_internet_connectivity_for_embedded_devicesn/a
CVE-2021-34148
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.44%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 06:24
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with a greater ACL Length after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service (firmware crash) via a crafted LMP packet.

Action-Not Available
Vendor-cypressn/a
Product-cyw20735b1wireless_internet_connectivity_for_embedded_devicesn/a
CVE-2021-34145
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 30.97%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 06:22
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with an invalid Baseband packet type (and LT_ADDRESS and LT_ADDR) after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service (firmware crash) via a crafted LMP packet.

Action-Not Available
Vendor-cypressn/a
Product-cyw20735b1wireless_internet_connectivity_for_embedded_devicesn/a
CVE-2021-34146
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.44%
||
7 Day CHG~0.00%
Published-07 Sep, 2021 | 06:18
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Classic implementation in the Cypress CYW920735Q60EVB does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and restart (crash) of the device by flooding it with LMP_AU_Rand packets after the paging procedure.

Action-Not Available
Vendor-cypressn/a
Product-cyw920735q60evb-01_firmwarecyw20735b1_firmwarecyw20735b1cyw920735q60evb-01n/a
CVE-2019-18614
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.48%
||
7 Day CHG~0.00%
Published-16 Jun, 2020 | 13:42
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On the Cypress CYW20735 evaluation board, any data that exceeds 384 bytes is copied and causes an overflow. This is because the maximum BLOC buffer size for sending and receiving data is set to 384 bytes, but everything else is still configured to the usual size of 1092 (which was used for everything in the previous CYW20719 and later CYW20819 evaluation board). To trigger the overflow, an attacker can either send packets over the air or as unprivileged local user. Over the air, the minimal PoC is sending "l2ping -s 600" to the target address prior to any pairing. Locally, the buffer overflow is immediately triggered by opening an ACL or SCO connection to a headset. This occurs because, in WICED Studio 6.2 and 6.4, BT_ACL_HOST_TO_DEVICE_DEFAULT_SIZE and BT_ACL_DEVICE_TO_HOST_DEFAULT_SIZE are set to 384.

Action-Not Available
Vendor-cypressn/a
Product-cyw20735cyw20735_firmwaren/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2020-11957
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.95%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 18:26
Updated-04 Aug, 2024 | 11:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64 generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits during BLE pairing. This is the case for both authenticated and unauthenticated pairing with both LE Secure Connections as well as LE Legacy Pairing. A predictable or brute-forceable random number allows an attacker (in radio range) to perform a MITM attack during BLE pairing.

Action-Not Available
Vendor-cypressn/a
Product-psoc_4.2_blen/a
CWE ID-CWE-331
Insufficient Entropy
CVE-2019-13916
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.26% / 48.83%
||
7 Day CHG~0.00%
Published-13 Apr, 2020 | 16:30
Updated-05 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Cypress (formerly Broadcom) WICED Studio 6.2 CYW20735B1 and CYW20819A1. As a Bluetooth Low Energy (BLE) packet is received, it is copied into a Heap (ThreadX Block) buffer. The buffer allocated in dhmulp_getRxBuffer is four bytes too small to hold the maximum of 255 bytes plus headers. It is possible to corrupt a pointer in the linked list holding the free buffers of the g_mm_BLEDeviceToHostPool Block pool. This pointer can be fully controlled by overflowing with 3 bytes of packet data and the first byte of the packet CRC checksum. The checksum can be freely chosen by adapting the packet data accordingly. An attacker might be able to allocate the overwritten address as a receive buffer resulting in a write-what-where condition. This is fixed in BT SDK2.4 and BT SDK2.45.

Action-Not Available
Vendor-cypressn/a
Product-cyw20735b1wiced_studiocyw20819a1n/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-16336
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.53% / 66.31%
||
7 Day CHG~0.00%
Published-12 Feb, 2020 | 17:59
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Low Energy implementation in Cypress PSoC 4 BLE component 3.61 and earlier processes data channel frames with a payload length larger than the configured link layer maximum RX payload size, which allows attackers (in radio range) to cause a denial of service (crash) via a crafted BLE Link Layer frame.

Action-Not Available
Vendor-cypressn/a
Product-cybl11573cyble-416045n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-17061
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.70% / 71.05%
||
7 Day CHG~0.00%
Published-10 Feb, 2020 | 20:17
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Bluetooth Low Energy (BLE) stack implementation on Cypress PSoC 4 through 3.62 devices does not properly restrict the BLE Link Layer header and executes certain memory contents upon receiving a packet with a Link Layer ID (LLID) equal to zero. This allows attackers within radio range to cause deadlocks, cause anomalous behavior in the BLE state machine, or trigger a buffer overflow via a crafted BLE Link Layer frame.

Action-Not Available
Vendor-cypressn/a
Product-psoc_4_blepsoc_4n/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2018-19860
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.79% / 72.97%
||
7 Day CHG~0.00%
Published-07 Jun, 2019 | 16:23
Updated-05 Aug, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Broadcom firmware before summer 2014 on Nexus 5 BCM4335C0 2012-12-11, Raspberry Pi 3 BCM43438A1 2014-06-02, and unspecifed other devices does not properly restrict LMP commnds and executes certain memory contents upon receiving an LMP command, as demonstrated by executing an HCI command.

Action-Not Available
Vendor-cypressn/aBroadcom Inc.
Product-cyw20706ua1kffb4gcyw20702a1kwfbg_firmwarecyw20707va2pkwbgtcyw20704ua1kffb1g_firmwarecyw20733a3kml1gt_firmwarecyw20733a3kml1gtcyw89072brfb5g_firmwarecyw20734ua1kffb3gcyw20730a1kml2gt_firmwarecyw4354kkwbgt_firmwarecyw20707a2kubgt_firmwarecyw20730a1kfbg_firmwarecyw4354kkwbgtcyw43438kubgt_firmwarecyw20704ua2kffb1gt_firmwarecyw89072brfb5gt_firmwarecyw20733a3kfb1gcyw20706ua2kffb4g_firmwarecyw20704ua1kffb1gcyw20704ua1kffb1gt_firmwarecyw20734ua2kffb3gtcyw4343wkwbgt_firmwarecyw20730a1kmlgcyw20733a2kml1gtcyw20730a1kmlgtcyw4354xkubgt_firmwarecyw20733a3kfb1gtcyw20702a1kwfbgt_firmwarecyw20730a1kml2gcyw20704ua1kffb1gtcyw89071a1cubxgtcyw20706ua2kffb4gtcyw20706ua1kffb1g_firmwarecyw20707ua1kffb4g_firmwarecyw4354xkubgtcyw20733a2kfb1g_firmwarecyw4343wkwbgtcyw20733a1kfb1gtcyw20705a1kwfbgt_firmwarecyw20733a2kml1gt_firmwarecyw20707ua1kffb1gcyw20702b0kwfbgt_firmwarecyw89335l2cubgtcyw20707ua1kffb1g_firmwarecyw20706ua1kffb1gcyw20733a1kfb1gt_firmwarecyw20733a2kfb1gtcyw20703ua1kffb1g_firmwarecyw20734ua2kffb3gt_firmwarecyw20705b0kwfbgcyw20734ua2kffb3g_firmwarecyw4343w1kubgtcyw20706ua1kffb1gtcyw20730a2kfbg_firmwarecyw4343wkubgt_firmwarecyw20730a1kfbgcyw20706ua1kffb4g_firmwarecyw20707ua2kffb4gtcyw20706ua2kffb4gt_firmwarecyw20707va1pkwbgt_firmwarebcm4335c0_firmwarecyw20707va1pkwbgtcyw20730a2kml2gtcyw20733a3kml1g_firmwarecyw89071a1cubxgt_firmwarecyw20734ua1kffb3gt_firmwarecyw20707ua2kffb4gt_firmwarecyw20707ua1kffb4gtcyw20730a2kfbgtcyw20734ua1kffb3gtcyw20734ua1kffb3g_firmwarebcm43438a1cyw20730a1kml2g_firmwarecyw20703ua1kffb1gcyw89335l2cubgt_firmwarecyw20705a1kwfbgtcyw20702a1kwfbgtcyw20706ua1kffb1gt_firmwarecyw20730a2kfbgcyw20733a3kfb1gt_firmwarecyw89335lcubgtcyw20733a2kml1gbcm43438a1_firmwarecyw20730a1kfbgtcyw4343w1kubgt_firmwarecyw20733a3kfb2gtcyw20730a2kml2g_firmwarecyw20704ua2kffb1gcyw20707ua1kffb4gcyw20707va2pkwbgt_firmwarecyw20730a2kfbgt_firmwarecyw20705b0kwfbgtcyw89335lcubgt_firmwarecyw20707ua1kffb4gt_firmwarecyw20707ua2kffb4gcyw4343wkubgtcyw20702b0kwfbgtcyw20730a2kml2gt_firmwarecyw20733a2kml1g_firmwarecyw20730a1kmlg_firmwarecyw20730a1kmlgt_firmwarecyw89072brfb5gtcyw20703ua1kffb1gtcyw20705b0kwfbg_firmwarecyw20704ua2kffb1g_firmwarecyw20733a2kfb1gt_firmwarecyw20705b0kwfbgt_firmwarecyw20702a1kwfbgcyw20703ua1kffb1gt_firmwarecyw20733a3kfb2gt_firmwarecyw43438kubgtcyw20702b0kwfbgcyw20707ua2kffb4g_firmwarebcm4335c0cyw20733a2kfb1gcyw20734ua2kffb3gcyw20733a3kml1gcyw20706ua2kffb4gcyw20702b0kwfbg_firmwarecyw20704ua2kffb1gtcyw20730a1kfbgt_firmwarecyw89072brfb5gcyw20733a3kfb1g_firmwarecyw20730a2kml2gcyw20707a2kubgtcyw20730a1kml2gtn/a
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2007-5922
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.34% / 55.64%
||
7 Day CHG~0.00%
Published-10 Nov, 2007 | 02:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The modules/mdop.m in the Cypress 1.0k script for BitchX, as downloaded from a distribution site in November 2007, contains an externally introduced backdoor that e-mails sensitive information (hostnames, usernames, and shell history) to a fixed address.

Action-Not Available
Vendor-bitchxcypressn/a
Product-cypressbitchxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor