{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T08:08:20.055","vulnerabilities":[{"cve":{"id":"CVE-2024-47250","sourceIdentifier":"security@apache.org","published":"2024-11-26T12:15:19.230","lastModified":"2025-07-08T14:16:34.670","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Out-of-bounds Read vulnerability in Apache NimBLE.\n\nMissing proper validation of HCI advertising report could lead to out-of-bound access when parsing HCI event and thus bogus GAP 'device found' events being sent.\nThis issue requires broken or bogus Bluetooth controller and thus severity is considered low.\nThis issue affects Apache NimBLE: through 1.7.0.\n\n\nUsers are recommended to upgrade to version 1.8.0, which fixes the issue."},{"lang":"es","value":"Vulnerabilidad de lectura fuera de los límites en Apache NimBLE. La falta de una validación adecuada del informe de publicidad de HCI podría provocar un acceso fuera de los límites al analizar un evento de HCI y, por lo tanto, el envío de eventos de \"dispositivo encontrado\" de GAP falsos. Este problema requiere un controlador Bluetooth roto o falso y, por lo tanto, la gravedad se considera baja. Este problema afecta a Apache NimBLE: hasta 1.7.0. Se recomienda a los usuarios que actualicen a la versión 1.8.0, que soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":5.0,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.6,"impactScore":3.4}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:nimble:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.0","matchCriteriaId":"71BB8957-7DC2-4E02-B560-1526E9758F46"}]}]}],"references":[{"url":"https://github.com/apache/mynewt-nimble/commit/23d61150ddae4bc8356356d7ef09d816fb89da45","source":"security@apache.org","tags":["Patch"]},{"url":"https://github.com/apache/mynewt-nimble/commit/3b7a32ea09a3bffaab831ee0ab193a2375fc4df6","source":"security@apache.org","tags":["Patch"]},{"url":"https://lists.apache.org/thread/zdb50spojlqbn0yxd866mbzqjt2vpt85","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/11/26/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]}]}}]}