Security features bypass in Bluetooth Core Specification - #VU53580

 

Security features bypass in Bluetooth Core Specification - #VU53580

Published: May 26, 2021


Vulnerability identifier: #VU53580
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-254
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Bluetooth Core Specification
Software vendor:
Bluetooth SIG, Inc.

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to the issue within the Authentication of the Bluetooth LE legacy pairing protocol. An attacker with physical access can reflect the confirmation and random numbers of a peer device in LE legacy pairing to successfully complete legacy authentication phase 2 without knowledge of the temporary key (TK).


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links