This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

WL18XX-BT-SP: WL1831

Part Number: WL18XX-BT-SP

Tool/software:

Hello,

I am Suhel Mulla. I am part of the firmware team in Philips Healthcare Innovation Centre at Pune, India. We are using TI Bluetopia stack on WL 1831 chip (Wi-Fi Bluetooth combo).

We observed that, during pairing process, the vulnerability occurs when peripheral accepts an out of order encryption request from the central and the pairing process between peripheral and central successfully completes with a LTK key negotiated to 0.

The Zero LTK Installation allows an attacker to fully bypass the pairing procedure by forcing an encryption setup procedure with a zero filled LTK.

How can we fix this problem?

Regards,

Suhel