CVE-2025-53477

Source
https://cve.org/CVERecord?id=CVE-2025-53477
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53477.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-53477
Published
2026-01-10T10:15:50.660Z
Modified
2026-03-14T15:04:54.402620Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

NULL Pointer Dereference vulnerability in Apache Nimble.

Missing validation of HCI connection complete or HCI command TX buffer could lead to NULL pointer dereference. This issue requires disabled asserts and broken or bogus Bluetooth controller and thus severity is considered low.

This issue affects Apache NimBLE: through 1.8.0.

Users are recommended to upgrade to version 1.9.0, which fixes the issue.

References

Affected packages

Git / github.com/apache/mynewt-nimble

Affected ranges

Type
GIT
Repo
https://github.com/apache/mynewt-nimble
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.9.0"
        }
    ]
}

Affected versions

Other
nimble_1_5_0_rc1_tag
nimble_1_5_0_tag
nimble_1_6_0_rc1_tag
nimble_1_6_0_tag
nimble_1_7_0_rc1_tag
nimble_1_7_0_tag
nimble_1_8_0_rc1_tag
nimble_1_8_0_tag

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53477.json"
vanir_signatures
[
    {
        "signature_version": "v1",
        "target": {
            "file": "nimble/host/src/ble_gap.c",
            "function": "ble_gap_rx_conn_complete"
        },
        "source": "https://github.com/apache/mynewt-nimble/commit/3160b8c4c7ff8db4e0f9badcdf7df684b151e077",
        "deprecated": false,
        "digest": {
            "function_hash": "236507282372735512032156851895108854076",
            "length": 2876.0
        },
        "id": "CVE-2025-53477-858d05ca",
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "nimble/host/src/ble_hs_hci_cmd.c",
            "function": "ble_hs_hci_cmd_send"
        },
        "source": "https://github.com/apache/mynewt-nimble/commit/0caf9baeb271ede85fcc5237ab87ddbf938600da",
        "deprecated": false,
        "digest": {
            "function_hash": "156309444431151712171580241646326466877",
            "length": 449.0
        },
        "id": "CVE-2025-53477-ea8a2f61",
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "nimble/host/src/ble_gap.c"
        },
        "source": "https://github.com/apache/mynewt-nimble/commit/3160b8c4c7ff8db4e0f9badcdf7df684b151e077",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "63346765873765531974889259795006051328",
                "278018918817860638193892317901432348288",
                "175030169787089050849113514058944668153",
                "281044296964091833580111298415476363970"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2025-53477-eeae66c0",
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "nimble/host/src/ble_hs_hci_cmd.c"
        },
        "source": "https://github.com/apache/mynewt-nimble/commit/0caf9baeb271ede85fcc5237ab87ddbf938600da",
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "301710730003976375853815302583532200466",
                "273523993245177517171212260043449370436",
                "266319923594785334452590204825802586844",
                "202310094113137028096218577820710089162"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2025-53477-fec150e3",
        "signature_type": "Line"
    }
]