Cyber Posture

CVE-2025-62235

High

Published: 10 January 2026

Published
10 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0004 13.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-62235 is a high-severity Authentication Bypass by Spoofing (CWE-290) vulnerability in Apache Nimble. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Valid Accounts (T1078); ranked at the 13.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-3 (Device Identification and Authentication) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Valid Accounts (T1078). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires unique identification and authentication of devices before establishing BLE connections, directly preventing spoofing attacks that exploit crafted Security Requests to remove bonds and impersonate legitimate devices.

prevent

Mandates timely identification, reporting, and patching of flaws like the NimBLE authentication bypass fixed in version 1.9.0, eliminating the vulnerability at its source.

prevent

Implements protections for wireless links such as BLE to ensure confidentiality and integrity during transmission, mitigating risks from adjacent-network spoofing and unauthorized re-bonding.

MITRE ATT&CK Enterprise TechniquesAI

T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Auth bypass via BLE device spoofing directly enables impersonation of valid bonded devices/accounts for unauthorized access.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Authentication Bypass by Spoofing vulnerability in Apache NimBLE. Receiving specially crafted Security Request could lead to removal of original bond and re-bond with impostor. This issue affects Apache NimBLE: through 1.8.0. Users are recommended to upgrade to version 1.9.0, which…

more

fixes the issue.

Deeper analysisAI

CVE-2025-62235 is an Authentication Bypass by Spoofing vulnerability (CWE-290) in Apache NimBLE, affecting all versions through 1.8.0. The issue arises when receiving a specially crafted Security Request, which can lead to the removal of the original bond and re-bonding with an impostor, published on 2026-01-10 with a CVSS v3.1 base score of 8.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

An attacker in the adjacent network, such as within Bluetooth Low Energy range, can exploit this vulnerability with low attack complexity and no required privileges or user interaction. Successful exploitation enables the attacker to impersonate a legitimate device, bypassing authentication mechanisms to gain high-level access to confidential data and modify integrity-protected communications without impacting availability.

Apache recommends upgrading to version 1.9.0, which addresses the issue. The fixing commit is available at https://github.com/apache/mynewt-nimble/commit/41f67e391e788c5feef9030026cc5cbc5431838a, with further details in the Apache mailing list announcement at https://lists.apache.org/thread/rw2mrpfwb9d9wmq4h4b6ctcd6gpkk2ho and the OSS-Security mailing list at http://www.openwall.com/lists/oss-security/2026/01/08/4.

Details

CWE(s)

Affected Products

apache
nimble
≤ 1.9.0

CVEs Like This One

CVE-2025-53477Same product: Apache Nimble
CVE-2025-52435Same product: Apache Nimble
CVE-2025-24458Shared CWE-290
CVE-2026-23906Same vendor: Apache
CVE-2026-31987Same vendor: Apache
CVE-2024-55532Same vendor: Apache
CVE-2025-66524Same vendor: Apache
CVE-2026-24308Same vendor: Apache
CVE-2026-30911Same vendor: Apache
CVE-2026-41602Same vendor: Apache

References