CVE-2024-45434

OpenSynergy BlueSDK (aka Blue SDK) through 6.x has a Use-After-Free. The specific flaw exists within the BlueSDK Bluetooth stack. The issue results from the lack of validating the existence of an object before performing operations on the object (aka use after free). An attacker can leverage this to achieve remote code execution in the context of a user account under which the Bluetooth process runs.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensynergy:blue_sdk:*:*:*:*:*:*:*:*

History

02 Oct 2025, 20:00

Type Values Removed Values Added
CPE cpe:2.3:a:opensynergy:blue_sdk:*:*:*:*:*:*:*:*
First Time Opensynergy
Opensynergy blue Sdk
References () https://pcacybersecurity.com/resources/advisory/perfekt-blue - () https://pcacybersecurity.com/resources/advisory/perfekt-blue - Exploit, Third Party Advisory
References () https://www.opensynergy.com/ - () https://www.opensynergy.com/ - Product

12 Sep 2025, 18:15

Type Values Removed Values Added
References () https://pcacybersecurity.com/resources/advisory/perfekt-blue - () https://pcacybersecurity.com/resources/advisory/perfekt-blue -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-416

12 Sep 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-12 17:15

Updated : 2025-10-02 20:00


NVD link : CVE-2024-45434

Mitre link : CVE-2024-45434

CVE.ORG link : CVE-2024-45434


JSON object : View

Products Affected

opensynergy

  • blue_sdk
CWE
CWE-416

Use After Free