opensynergy CVE Vulnerabilities & Metrics

Focus on opensynergy vulnerabilities and metrics.

Last updated: 25 Nov 2025, 23:25 UTC

About opensynergy Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with opensynergy. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total opensynergy CVEs: 5
Earliest CVE date: 29 Mar 2019, 15:29 UTC
Latest CVE date: 12 Sep 2025, 17:15 UTC

Latest CVE reference: CVE-2024-45434

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical opensynergy CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.08

Max CVSS: 5.4

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 1
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS opensynergy CVEs

These are the five CVEs with the highest CVSS scores for opensynergy, sorted by severity first and recency.

All CVEs for opensynergy

CVE-2024-45434 opensynergy vulnerability CVSS: 0 12 Sep 2025, 17:15 UTC

OpenSynergy BlueSDK (aka Blue SDK) through 6.x has a Use-After-Free. The specific flaw exists within the BlueSDK Bluetooth stack. The issue results from the lack of validating the existence of an object before performing operations on the object (aka use after free). An attacker can leverage this to achieve remote code execution in the context of a user account under which the Bluetooth process runs.

CVE-2024-45433 opensynergy vulnerability CVSS: 0 12 Sep 2025, 17:15 UTC

OpenSynergy BlueSDK (aka Blue SDK) through 6.x has Incorrect Control Flow Scoping. The specific flaw exists within the BlueSDK Bluetooth stack. The issue results from the lack of proper return control flow after detecting an unusual condition. An attacker can leverage this to bypass a security validation and make the incoming data be processed.

CVE-2024-45432 opensynergy vulnerability CVSS: 0 12 Sep 2025, 17:15 UTC

OpenSynergy BlueSDK (aka Blue SDK) through 6.x mishandles a function call. The specific flaw exists within the BlueSDK Bluetooth stack. The issue results from an incorrect variable used as a function argument. An attacker can leverage this to cause unexpected behavior or obtain sensitive information.

CVE-2024-45431 opensynergy vulnerability CVSS: 0 12 Sep 2025, 17:15 UTC

OpenSynergy BlueSDK (aka Blue SDK) through 6.x has Improper Input Validation. The specific flaw exists within the BlueSDK Bluetooth stack. The issue results from the lack of proper validation of remote L2CAP channel ID (CID). An attacker can leverage this to create an L2CAP channel with the null identifier assigned as a remote CID.

CVE-2018-20378 opensynergy vulnerability CVSS: 5.4 29 Mar 2019, 15:29 UTC

The L2CAP signaling channel implementation and SDP server implementation in OpenSynergy Blue SDK 3.2 through 6.0 allow remote, unauthenticated attackers to execute arbitrary code or cause a denial of service via malicious L2CAP configuration requests, in conjunction with crafted SDP communication over maliciously configured L2CAP channels. The attacker must have connectivity over the Bluetooth physical layer, and must be able to send raw L2CAP frames. This is related to L2Cap_HandleConfigReq in core/stack/l2cap/l2cap_sm.c and SdpServHandleServiceSearchAttribReq in core/stack/sdp/sdpserv.c.