Количество 31
Количество 31
CVE-2020-26558
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2020-26558
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2020-26558
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
CVE-2020-26558
CVE-2020-26558
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification ...
GHSA-7g33-jchx-2fjc
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
ELSA-2021-4432
ELSA-2021-4432: bluez security update (MODERATE)
BDU:2021-05198
Уязвимость спецификации Bluetooth Core Specification ядра операционной системы Linux, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
openSUSE-SU-2021:2291-1
Security update for bluez
SUSE-SU-2021:2291-1
Security update for bluez
openSUSE-SU-2021:2202-1
Security update for the Linux Kernel
openSUSE-SU-2021:2184-1
Security update for the Linux Kernel
SUSE-SU-2021:2202-1
Security update for the Linux Kernel
SUSE-SU-2021:2184-1
Security update for the Linux Kernel
SUSE-SU-2022:3691-1
Security update for bluez
SUSE-SU-2022:3687-1
Security update for bluez
SUSE-SU-2021:2349-1
Security update for the Linux Kernel
SUSE-SU-2021:2325-1
Security update for the Linux Kernel
SUSE-SU-2021:2324-1
Security update for the Linux Kernel
SUSE-SU-2021:2321-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-26558 Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time. | CVSS3: 4.2 | 0% Низкий | больше 4 лет назад | |
CVE-2020-26558 Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time. | CVSS3: 4.2 | 0% Низкий | больше 4 лет назад | |
CVE-2020-26558 Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time. | CVSS3: 4.2 | 0% Низкий | больше 4 лет назад | |
CVSS3: 4.2 | 0% Низкий | почти 4 года назад | ||
CVE-2020-26558 Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification ... | CVSS3: 4.2 | 0% Низкий | больше 4 лет назад | |
GHSA-7g33-jchx-2fjc Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time. | CVSS3: 4.2 | 0% Низкий | больше 3 лет назад | |
ELSA-2021-4432 ELSA-2021-4432: bluez security update (MODERATE) | около 4 лет назад | |||
BDU:2021-05198 Уязвимость спецификации Bluetooth Core Specification ядра операционной системы Linux, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность | CVSS3: 4.2 | 0% Низкий | больше 4 лет назад | |
openSUSE-SU-2021:2291-1 Security update for bluez | больше 4 лет назад | |||
SUSE-SU-2021:2291-1 Security update for bluez | больше 4 лет назад | |||
openSUSE-SU-2021:2202-1 Security update for the Linux Kernel | больше 4 лет назад | |||
openSUSE-SU-2021:2184-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2202-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2184-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2022:3691-1 Security update for bluez | больше 3 лет назад | |||
SUSE-SU-2022:3687-1 Security update for bluez | больше 3 лет назад | |||
SUSE-SU-2021:2349-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2325-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2324-1 Security update for the Linux Kernel | больше 4 лет назад | |||
SUSE-SU-2021:2321-1 Security update for the Linux Kernel | больше 4 лет назад |
Уязвимостей на страницу