Cyber Posture

CVE-2025-53477

High

Published: 10 January 2026

Published
10 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0036 58.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53477 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Apache Nimble. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 41.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

NULL dereference in Bluetooth stack enables remote DoS via application exploitation under specific faulty controller conditions.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

NULL Pointer Dereference vulnerability in Apache Nimble. Missing validation of HCI connection complete or HCI command TX buffer could lead to NULL pointer dereference. This issue requires disabled asserts and broken or bogus Bluetooth controller and thus severity is considered…

more

low. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which fixes the issue.

Deeper analysisAI

CVE-2025-53477 is a NULL Pointer Dereference vulnerability in Apache NimBLE, a Bluetooth Low Energy stack. The issue stems from missing validation of HCI connection complete or HCI command TX buffer, which could lead to a NULL pointer dereference. It affects Apache NimBLE versions through 1.8.0.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating potential for network-based exploitation with low complexity, no privileges or user interaction required, and high impact on availability via denial of service. However, exploitation requires disabled asserts and a broken or bogus Bluetooth controller, which contributes to its low overall severity assessment.

Apache recommends upgrading to version 1.9.0, which fixes the issue. Relevant advisories and patches are detailed in GitHub commits (0caf9baeb271ede85fcc5237ab87ddbf938600da and 3160b8c4c7ff8db4e0f9badcdf7df684b151e077), the Apache mailing list (lists.apache.org/thread/1dxthc132hwm2tzvjblrtnschcsbw2vo), and oss-security announcement (www.openwall.com/lists/oss-security/2026/01/08/3). The issue is associated with CWE-476.

Details

CWE(s)

Affected Products

apache
nimble
≤ 1.9.0

CVEs Like This One

CVE-2025-62235Same product: Apache Nimble
CVE-2025-52435Same product: Apache Nimble
CVE-2026-29169Same vendor: Apache
CVE-2025-48431Same vendor: Apache
CVE-2026-42402Same vendor: Apache
CVE-2026-42403Same vendor: Apache
CVE-2026-41636Same vendor: Apache
CVE-2025-23184Same vendor: Apache
CVE-2026-4652Shared CWE-476
CVE-2026-33282Shared CWE-476

References