Improper Authentication in Linux kernel - CVE-2026-31773

 

Improper Authentication in Linux kernel - CVE-2026-31773

Published: May 2, 2026


Vulnerability identifier: #VU128923
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2026-31773
CWE-ID: CWE-287
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass authentication requirements.

The vulnerability exists due to improper authentication state handling in the Bluetooth SMP legacy responder STK handling in smp_random() when processing Just Works or Confirm legacy pairing. A remote attacker can initiate a legacy pairing sequence that results in an unauthenticated STK being stored as authenticated to bypass authentication requirements.

The issue affects the legacy responder path and occurs when high security is requested but the pairing flow does not achieve MITM authentication.


How to mitigate CVE-2026-31773

Install security update from vendor's repository.

Sources