CVE-2025-53477
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-10

Last updated on: 2026-01-14

Assigner: Apache Software Foundation

Description
NULL Pointer Dereference vulnerability in Apache Nimble. Missing validation of HCI connection complete or HCI command TX buffer could lead to NULL pointer dereference. This issue requires disabled asserts and broken or bogus Bluetooth controller and thus severity is considered low. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-10
Last Modified
2026-01-14
Generated
2026-05-07
AI Q&A
2026-01-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache nimble to 1.9.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a NULL Pointer Dereference issue in the Apache NimBLE Bluetooth host HCI layer. It occurs because the software does not properly validate the HCI connection complete event or the HCI command transmit (TX) buffer, which can lead to dereferencing a null pointer. However, to exploit this vulnerability, asserts must be disabled and the Bluetooth controller must be broken or bogus, which limits the likelihood and impact of exploitation. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability could cause the Apache NimBLE software to dereference a null pointer, potentially leading to a crash or denial of service. However, because exploitation requires disabled asserts and a faulty Bluetooth controller, the severity is considered low and the impact is limited. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is related to a NULL pointer dereference in the Apache NimBLE Bluetooth host HCI layer caused by missing validation of HCI connection complete events or HCI command transmit buffers. Detection would involve monitoring for crashes or abnormal behavior in the Bluetooth stack related to HCI events, especially if asserts are disabled and a broken or bogus Bluetooth controller is present. However, no specific detection commands or network/system scanning methods are provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

The immediate recommended mitigation is to upgrade Apache NimBLE to version 1.9.0 or later, where the issue has been fixed by adding explicit null pointer checks to prevent NULL pointer dereferences. This upgrade addresses the vulnerability by improving robustness in the HCI command buffer allocation and BLE GAP connection completion handler. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart