CVE-2020-10135
CVSS V2 Medium 4.8
CVSS V3 Medium 5.4
Description
Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
Overview
- CVE ID
- CVE-2020-10135
- Assigner
- cret@cert.org
- Vulnerability Status
- Analyzed
- Published Version
- 2020-05-19T16:15:11
- Last Modified Date
- 2021-12-21T12:42:21
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:bluetooth:bluetooth_core:*:*:*:*:br:*:*:* | 1 | OR | 5.2 | |
cpe:2.3:a:bluetooth:bluetooth_core:*:*:*:*:edr:*:*:* | 1 | OR | 5.2 | |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:A/AC:L/Au:N/C:P/I:P/A:N
- Access Vector
- ADJACENT_NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 4.8
- Severity
- MEDIUM
- Exploitability Score
- 6.5
- Impact Score
- 4.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
- Attack Vector
- ADJACENT_NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 5.4
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 2.5
References
Reference URL | Reference Tags |
---|---|
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/ | Vendor Advisory |
https://kb.cert.org/vuls/id/647177/ | Third Party Advisory US Government Resource |
https://francozappa.github.io/about-bias/ | Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Jun/5 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html | Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html | Broken Link Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html | Broken Link Mailing List Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-10135 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:40:32 | Added to TrackCVE | |||
2022-12-04 16:41:34 | cert@cert.org | cret@cert.org | CVE Assigner | updated |
2022-12-04 16:41:34 | 2020-05-19T16:15Z | 2020-05-19T16:15:11 | CVE Published Date | updated |
2022-12-04 16:41:34 | 2021-12-21T12:42:21 | CVE Modified Date | updated | |
2022-12-04 16:41:34 | Analyzed | Vulnerability Status | updated |