CVE-2025-62235
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-10

Last updated on: 2026-01-14

Assigner: Apache Software Foundation

Description
Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-10
Last Modified
2026-01-14
Generated
2026-05-07
AI Q&A
2026-01-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache nimble to 1.9.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-290 This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-62235 is an authentication bypass vulnerability in Apache NimBLE (up to version 1.8.0) caused by improper handling of the Security Manager Protocol (SMP) Security Request. An attacker can send a specially crafted Security Request that causes the device to remove its original bond and re-bond with an impostor device. This allows unauthorized devices to pair with the target device by spoofing the Security Request, compromising the pairing process. [1, 3]


How can this vulnerability impact me? :

This vulnerability can allow an attacker to bypass authentication and impersonate a trusted device by removing the original bond and establishing a new bond with the target device. This can lead to unauthorized access, potential data interception, or manipulation of the device's Bluetooth Low Energy communications, compromising device security and user privacy. [3, 1]


What immediate steps should I take to mitigate this vulnerability?

Users are recommended to upgrade Apache NimBLE to version 1.9.0, which fixes the vulnerability by improving the handling of Security Manager Protocol (SMP) Security Requests and enforcing peer authentication before security level elevation. This upgrade mitigates the risk of authentication bypass by spoofing. No other immediate mitigation steps are detailed in the provided resources. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart