Vulnerability identifier: #VU8322
Vulnerability risk: Low
CVSSv3.1: 5.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Windows
Operating systems & Components /
Operating system
Windows Server
Operating systems & Components /
Operating system
Vendor: Microsoft
Description
A remote attacker can perform spoofing attack.
A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. An attacker can perform a MitM (Man-in-the-Middle) attack and force a user's computer to unknowingly route traffic through the attacker's computer. The attacker can then monitor and read the traffic before sending it on to the intended recipient.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Windows: 8.1 - 8.1 RT, 7
Windows Server: 2008 - 2016 10.0.14393.10
External links
http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8628
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.