CVE-2025-62235
BaseFortify
Publication date: 2026-01-10
Last updated on: 2026-01-14
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | nimble | to 1.9.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-62235 is an authentication bypass vulnerability in Apache NimBLE (up to version 1.8.0) caused by improper handling of the Security Manager Protocol (SMP) Security Request. An attacker can send a specially crafted Security Request that causes the device to remove its original bond and re-bond with an impostor device. This allows unauthorized devices to pair with the target device by spoofing the Security Request, compromising the pairing process. [1, 3]
How can this vulnerability impact me? :
This vulnerability can allow an attacker to bypass authentication and impersonate a trusted device by removing the original bond and establishing a new bond with the target device. This can lead to unauthorized access, potential data interception, or manipulation of the device's Bluetooth Low Energy communications, compromising device security and user privacy. [3, 1]
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade Apache NimBLE to version 1.9.0, which fixes the vulnerability by improving the handling of Security Manager Protocol (SMP) Security Requests and enforcing peer authentication before security level elevation. This upgrade mitigates the risk of authentication bypass by spoofing. No other immediate mitigation steps are detailed in the provided resources. [1, 3]