VYPR
Unrated severityNVD Advisory· Published Apr 10, 2015· Updated May 6, 2026

CVE-2015-2247

CVE-2015-2247

Description

Unspecified vulnerability in Boosted Boards skateboards allows physically proximate attackers to modify skateboard movement, cause human injury, or cause physical damage via vectors related to an "injection attack" that blocks and hijacks a Bluetooth signal.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Boosted Boards skateboards lack Bluetooth encryption, allowing a nearby attacker to block and hijack the controller connection and remotely control the board.

Vulnerability

Boosted Boards electric skateboards are vulnerable to a Bluetooth injection attack. The boards use an unencrypted or weakly encrypted Bluetooth connection between the handheld controller and the skateboard's motor controller. This allows an attacker within Bluetooth range to block the legitimate signal and force the board to pair with an attacker-controlled device. The affected firmware and hardware versions were not explicitly detailed in the available sources. [1][2]

Exploitation

An attacker needs to be physically proximate (within standard Bluetooth range, approximately 10–30 meters) and does not require authentication. The attack involves saturating the 2.4 GHz spectrum to disconnect the legitimate controller, then spoofing the controller's Bluetooth signals to pair with the board. The process can be automated with a script, and the attacker can execute it rapidly—as fast as 10 seconds—even while carrying a laptop in a backpack. [1][2]

Impact

Successful exploitation allows the attacker to fully control the skateboard's motor, including acceleration and braking, while a rider is using it. This can cause the rider to be thrown off, leading to injury, or cause the board to crash into obstacles, resulting in physical damage. The attack constitutes remote hijacking of the vehicle's motion control. [2]

Mitigation

As of the publication date (2015-04-10), no official firmware update or patch was available to address this vulnerability. The vendor did not publicly release a fixed version. Mitigation relies on users being aware that the Bluetooth connection is not secure and avoiding use in settings where a potential attacker could be within range. The vulnerability was not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog. The researchers did not release their exploit code. [2]

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • cpe:2.3:a:boosted:boosted_boards:-:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:boosted:boosted_boards:-:*:*:*:*:*:*:*
    • (no CPE)

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.