The Apache Software Foundation has issued urgent patches for Apache NimBLE, the open-source Bluetooth 5.4 stack used to replace proprietary drivers on Nordic chipsets. A cluster of four security vulnerabilities has been disclosed, two of which are rated “Important,” allowing attackers to bypass authentication or eavesdrop on encrypted connections.
The flaws affect all versions of Apache NimBLE up to 1.8.0, leaving unpatched IoT devices and embedded systems exposed to proximity-based attacks.
The most alarming vulnerability is an Authentication Bypass by Spoofing flaw. Tracked as CVE-2025-62235, this “Important” severity bug breaks the fundamental trust bond between paired devices.
By sending a “specially crafted Security Request,” an attacker can force the victim device to remove its original pairing bond and re-bond with an impostor . This effectively allows a rogue device to masquerade as a trusted peripheral—like a headset or keyboard—granting it unauthorized access to the host system.
Another “Important” flaw targets the privacy of data in transit. CVE-2025-52435 involves a failure in handling the “Pause Encryption” procedure on the Link Layer.
When a connection is paused and then resumed, improper error handling can result in a “previously encrypted connection being left in an un-encrypted state” . This silent downgrade essentially strips away security, “allowing an eavesdropper to observe the remainder of the exchange” without the user ever knowing their secure channel has been compromised.
The update also fixes two “Low” severity bugs that could crash devices or corrupt memory:
- CVE-2025-53477: A NULL Pointer Dereference in the host HCI layer. If a device has disabled asserts and encounters a “broken or bogus Bluetooth controller,” a missing validation check can crash the system.
- CVE-2025-53470: An Out-of-Bounds Write (and Read) vulnerability in the HCI H4 driver. Malformed HCI events can trigger invalid memory operations, potentially leading to instability.
The Apache NimBLE team has released version 1.9.0 to address all four vulnerabilities. Developers and manufacturers using this stack in their products are urged to integrate the update immediately to close these authentication and privacy gaps.
Related Posts:
- Over 30% of Android devices have eavesdropping vulnerabilities, MediaTek is releasing an update to fix the vulnerabilities
- Russia-Linked Threat Actors Exploiting Signal Messenger to Eavesdrop on Sensitive Communications
- Dual Audio: Windows 11 Finally Gets Bluetooth Audio Sharing, But Only for Copilot+ PCs