Описание
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
A flaw was discovered in the Bluetooth protocol. An attacker within physical proximity to the Bluetooth connection could downgrade the encryption protocol to be trivially brute forced.
Меры по смягчению последствий
At this time there is no known mitigation if bluetooth hardware is to be continue to be used. Replacing the hardware with its wired version and disabling bluetooth may be a suitable alternative for some environments.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Out of support scope | ||
Red Hat Enterprise Linux 6 | kernel | Will not fix | ||
Red Hat Enterprise Linux 7 | kernel-rt | Fixed | RHSA-2019:3089 | 16.10.2019 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2019:3055 | 16.10.2019 |
Red Hat Enterprise Linux 7 | kpatch-patch | Fixed | RHSA-2019:3076 | 16.10.2019 |
Red Hat Enterprise Linux 7 | kernel-alt | Fixed | RHSA-2019:3217 | 29.10.2019 |
Red Hat Enterprise Linux 7.2 Advanced Update Support | kernel | Fixed | RHSA-2020:1460 | 14.04.2020 |
Red Hat Enterprise Linux 7.3 Advanced Update Support | kernel | Fixed | RHSA-2019:3218 | 29.10.2019 |
Red Hat Enterprise Linux 7.3 Telco Extended Update Support | kernel | Fixed | RHSA-2019:3218 | 29.10.2019 |
Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions | kernel | Fixed | RHSA-2019:3218 | 29.10.2019 |
Показывать по
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
Связанные уязвимости
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
The Bluetooth BR/EDR specification up to and including version 5.1 per ...
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
EPSS
7 High
CVSS3