#VU22622 Cleartext transmission of sensitive information in BCM20702


Published: 2019-11-10

Vulnerability identifier: #VU22622

Vulnerability risk: Low

CVSSv3.1: 2 [CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: N/A

CWE-ID: CWE-319

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
BCM20702
Hardware solutions / Firmware

Vendor: Broadcom

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software firmware does not use encryption during communication via Bluetooth protocol. An attacker with physical proximity to the device can intercept network traffic can gain access to sensitive data, (e.g. perform a person-in-the-middle attack).

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Please, contact your hardware vendor to obtain patches.

Vulnerable software versions

BCM20702: All versions


External links
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00025.html


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability