Executive Summary
Summary | |
---|---|
Title | Bluetooth devices supporting LE and specific BR/EDR implementations are vulnerable to method confusion attacks |
Informations | |||
---|---|---|---|
Name | VU#534195 | First vendor Publication | 2020-05-18 |
Vendor | VU-CERT | Last vendor Modification | 2020-05-26 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N | |||
---|---|---|---|
Overall CVSS Score | 6.3 | ||
Base Score | 6.3 | Environmental Score | 6.3 |
impact SubScore | 4.2 | Temporal Score | 6.3 |
Exploitabality Sub Score | 2.1 | ||
Attack Vector | Adjacent | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | Low | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:M/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Adjacent network |
Cvss Impact Score | 4.9 | Attack Complexity | Medium |
Cvss Expoit Score | 5.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Bluetooth Low Energy (BLE) and Basic Rate / Enhanced Data Rate (BR/EDR) Core Configurations are used for low-power short-range communications. To establish an encrypted connection, two Bluetooth devices must pair with each other using an agreed upon Association Model. It is possible for an unauthenticated, adjacent attacker to man-in-the-middle (MITM) attack the pairing process and force each victim device into a different Association Model, possibly granting the attacker the ability to initiate any Bluetooth operation on either attacked device. |
Original Source
Url : https://kb.cert.org/vuls/id/534195 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-436 | Interpretation Conflict |
Alert History
Date | Informations |
---|---|
2020-06-12 21:17:38 |
|
2020-05-26 17:17:26 |
|
2020-05-23 13:15:35 |
|