Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-26558

Опубликовано: 24 мая 2021
Источник: debian
EPSS Низкий

Описание

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bluezfixed5.55-3.1package
linuxfixed5.10.40-1package
linuxfixed4.19.194-1busterpackage

Примечания

  • https://kb.cert.org/vuls/id/799380

  • https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/passkey-entry/

  • https://bugzilla.redhat.com/show_bug.cgi?id=1918602

  • https://git.kernel.org/linus/6d19628f539fccf899298ff02ee4c73e4bf6df3f

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html

  • https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738

EPSS

Процентиль: 6%
0.00023
Низкий

Связанные уязвимости

CVSS3: 4.2
ubuntu
больше 4 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

CVSS3: 4.2
redhat
больше 4 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

CVSS3: 4.2
nvd
больше 4 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

CVSS3: 4.2
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 4.2
github
больше 3 лет назад

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

EPSS

Процентиль: 6%
0.00023
Низкий