Security features bypass in Bluetooth Core Specification - #VU53580
Published: May 26, 2021
Bluetooth Core Specification
Bluetooth SIG, Inc.
Description
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the issue within the Authentication of the Bluetooth LE legacy pairing protocol. An attacker with physical access can reflect the confirmation and random numbers of a peer device in LE legacy pairing to successfully complete legacy authentication phase 2 without knowledge of the temporary key (TK).