CVE-2025-53477
BaseFortify
Publication date: 2026-01-10
Last updated on: 2026-01-14
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | nimble | to 1.9.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL Pointer Dereference issue in the Apache NimBLE Bluetooth host HCI layer. It occurs because the software does not properly validate the HCI connection complete event or the HCI command transmit (TX) buffer, which can lead to dereferencing a null pointer. However, to exploit this vulnerability, asserts must be disabled and the Bluetooth controller must be broken or bogus, which limits the likelihood and impact of exploitation. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability could cause the Apache NimBLE software to dereference a null pointer, potentially leading to a crash or denial of service. However, because exploitation requires disabled asserts and a faulty Bluetooth controller, the severity is considered low and the impact is limited. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is related to a NULL pointer dereference in the Apache NimBLE Bluetooth host HCI layer caused by missing validation of HCI connection complete events or HCI command transmit buffers. Detection would involve monitoring for crashes or abnormal behavior in the Bluetooth stack related to HCI events, especially if asserts are disabled and a broken or bogus Bluetooth controller is present. However, no specific detection commands or network/system scanning methods are provided in the available resources.
What immediate steps should I take to mitigate this vulnerability?
The immediate recommended mitigation is to upgrade Apache NimBLE to version 1.9.0 or later, where the issue has been fixed by adding explicit null pointer checks to prevent NULL pointer dereferences. This upgrade addresses the vulnerability by improving robustness in the HCI command buffer allocation and BLE GAP connection completion handler. [1]