Key Negotiation of Bluetooth Vulnerability in Cisco products

Published: 2019-08-14 | Updated: 2019-08-14
Severity Low
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2019-9506
CWE ID CWE-310
Exploitation vector Local
Public exploit N/A
Vulnerable software Cisco SPA525G2 Small Business IP Phones Subscribe
Cisco Wireless IP Phone 8851
Cisco Wireless IP Phone 8845
Cisco Wireless IP Phone 8821
Cisco IP Phone 8865
Cisco IP Phone 8861
Cisco DX80 Series IP Phones
Cisco DX70 Series IP Phones
Vendor Cisco Systems, Inc

Security Advisory

This security advisory describes one low risk vulnerability.

1) Cryptographic issues

Severity: Low

CVSSv3: 3.5 [CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-9506

CWE-ID: CWE-310 - Cryptographic Issues

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to a weakness in Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) protocol core specification that allows an attacker with close proximity to the affected system to perform a man-in-the-middle attack on an encrypted Bluetooth connection.

Successful exploitation of the vulnerability may allow an attacker to gain access to sensitive information or perform unauthorized actions.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco SPA525G2 Small Business IP Phones: -

Cisco Wireless IP Phone 8851: -

Cisco Wireless IP Phone 8845: -

Cisco Wireless IP Phone 8821: -

Cisco IP Phone 8865: -

Cisco IP Phone 8861: -

Cisco DX80 Series IP Phones: -

Cisco DX70 Series IP Phones: -

CPE External links

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth

Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.