Vulnerability Description
A lack of authentication and authorization mechanisms in the Bluetooth Low Energy (BLE) communication protocol of SRK Powertech Pvt Ltd Pebble Prism Ultra v2.9.2 allows attackers to reverse engineer the protocol and execute arbitrary commands on the device without establishing a connection. This is exploitable over Bluetooth Low Energy (BLE) proximity (Adjacent), requiring no physical contact with the device. Furthermore, the vulnerability is not limited to arbitrary commands but includes cleartext data interception and unauthenticated firmware hijacking via OTA services.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pebblepower | Pebble Prism Ultra Firmware | < 2.5.8 |
| Pebblepower | Pebble Prism Ultra | - |
Related Weaknesses (CWE)
References
- https://github.com/mukundbhuva/BLEached-SecurityExploitThird Party Advisory
- https://github.com/mukundbhuva/BLEached-Security/security/advisories/GHSA-cp6q-8ExploitThird Party Advisory
FAQ
What is CVE-2025-69969?
CVE-2025-69969 is a vulnerability with a CVSS score of 9.6 (CRITICAL). A lack of authentication and authorization mechanisms in the Bluetooth Low Energy (BLE) communication protocol of SRK Powertech Pvt Ltd Pebble Prism Ultra v2.9.2 allows attackers to reverse engineer t...
How severe is CVE-2025-69969?
CVE-2025-69969 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-69969?
Check the references section above for vendor advisories and patch information. Affected products include: Pebblepower Pebble Prism Ultra Firmware, Pebblepower Pebble Prism Ultra.