PT-2025-27362 · Airoha · Airoha Bluetooth Chips
Dennis Heinze
+2
·
Published
2025-06-29
·
Updated
2025-08-04
·
CVE-2025-20700
8.8
High
Base vector | Vector | AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Airoha Bluetooth audio SDK versions (affected versions not specified)
Airoha Bluetooth chips versions (affected versions not specified)
**Description:**
The Airoha Bluetooth audio SDK and chips contain a permission bypass that allows access to critical data of the RACE protocol through the Bluetooth LE GATT service. This can lead to remote escalation of privilege without requiring additional execution privileges or user interaction. Multiple reports indicate that devices from brands such as Bose, Sony, and JBL are affected. The vulnerability allows attackers within Bluetooth range to hijack connections, make calls, and eavesdrop through the device’s microphone. It has been reported as actively exploited.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
LPE
Missing Authentication
Weakness Enumeration
Related Identifiers
Affected Products
References · 27
- https://nvd.nist.gov/vuln/detail/CVE-2025-20700 · Security Note
- https://twitter.com/grok/status/1951372522156597498 · Twitter Post
- https://t.me/CVEtracker/29074 · Telegram Post
- https://twitter.com/hackersguru01/status/1942633099428253830 · Twitter Post
- https://twitter.com/grok/status/1951374649897746922 · Twitter Post
- https://twitter.com/Shift6Security/status/1939888004220309808 · Twitter Post
- https://twitter.com/Shift6Security/status/1939887956799508511 · Twitter Post
- https://twitter.com/dCypherIO/status/1939677849885004004 · Twitter Post
- https://twitter.com/NumeroUnoHacker/status/1942841734041592093 · Twitter Post
- https://twitter.com/infiltr08/status/1941894497002041745 · Twitter Post
- https://t.me/cveNotify/130729 · Telegram Post
- https://twitter.com/cybersecur80472/status/1943231961767571869 · Twitter Post
- https://twitter.com/nathy_hackers/status/1943183077477618153 · Twitter Post
- https://twitter.com/grok/status/1951856349538824198 · Twitter Post
- https://airoha.com/product-security-bulletin/2025 · Note