Last week, Armis Security published the discovery of two new vulnerabilities named BLEEDINGBIT. The first (CVE-2018-16986) is a classical buffer-overflow attack that allows an adversary to run arbitrary code on the BLE device. Once this occurs, the BLE device can be used to attack other devices in the system.
The other vulnerability (CVE-2018-7080) is related to an over-the-air upgradability feature, which appears to be specific to the affected TI devices and end products using this feature.
Both vulnerabilities are present in the Bluetooth stack software from TI, and the company already issued BLEEDINGBIT patches for the software vulnerabilities earlier this year. Texas Instruments appears to be following security best practice protocols as effectively as possible to ensure effective remediation of the situation.
Silicon Labs uses the affected TI BLE devices (CC2540 and CC2541) in our BLE112, BLE113, BLE121LR modules, and the BLED112 USB dongle.
Yet the Silicon Labs modules and dongle using the affected TI chips do not utilize the TI software stacks, which is where the vulnerabilities reside. Silicon Labs uses are our own proprietary stack for these devices. Silicon Labs has verified that our proprietary software stacks using the affected TI BLE chips are not vulnerable to the BLEEDINGBIT vulnerabilities.
For completeness, Silicon Labs Blue Gecko Bluetooth devices and modules using our Bluetooth SDK are not vulnerable to these exploits.