{"id":"CVE-2021-28135","details":"The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (crash) in ESP32 by flooding the target device with LMP Feature Response data.","modified":"2026-03-19T04:25:37.788619Z","published":"2021-09-07T06:15:07.230Z","references":[{"type":"WEB","url":"https://dl.packetstormsecurity.net/papers/general/braktooth.pdf"},{"type":"WEB","url":"https://www.espressif.com/en/products/socs/esp32"},{"type":"ADVISORY","url":"https://github.com/espressif/esp-idf"},{"type":"ADVISORY","url":"https://github.com/espressif/esp32-bt-lib"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/espressif/esp-idf","events":[{"introduced":"0"},{"last_affected":"c8315e01107c10898947a817d5cf763cdd3f5a4f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.4"}]}}],"versions":["v0.9","v1.0","v2.0-rc1","v2.1-rc1","v3.0-dev","v3.1-beta1","v3.1-dev","v3.2-beta1","v3.2-dev","v3.3-beta1","v3.3-beta2","v3.3-dev","v4.0-dev","v4.1-dev","v4.2-dev","v4.3-beta1","v4.3-dev","v4.4-dev"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-28135.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}