Page 4 of 19 results (0.004 seconds)

CVSS: 6.3EPSS: 0%CPEs: 3EXPL: 0

Pairing in Bluetooth® Core v5.2 and earlier may permit an unauthenticated attacker to acquire credentials with two pairing devices via adjacent access when the unauthenticated user initiates different pairing methods in each peer device and an end-user erroneously completes both pairing procedures with the MITM using the confirmation number of one peer as the passkey of the other. An adjacent, unauthenticated attacker could be able to initiate any Bluetooth operation on either attacked device exposed by the enabled Bluetooth profiles. This exposure may be limited when the user must authorize certain access explicitly, but so long as a user assumes that it is the intended remote device requesting permissions, device-local protections may be weakened. El emparejamiento en Bluetooth® Core versiones v5.2 y anteriores, puede permitir a un atacante no autenticado adquirir credenciales con dos dispositivos de emparejamiento mediante un acceso adyacente cuando un usuario no autenticado inicia diferentes métodos de emparejamiento en cada dispositivo homólogo y un usuario final completa erróneamente ambos procedimientos de emparejamiento con la técnica MITM usando el número de confirmación de un peer como clave de acceso del otro. Un atacante adyacente no autenticado podría ser capaz de iniciar cualquier operación de Bluetooth en cualquier dispositivo atacado expuesto por los perfiles de Bluetooth habilitados. • https://kb.cert.org/vuls/id/534195 https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/method-vulnerability • CWE-351: Insufficient Type Distinction CWE-436: Interpretation Conflict •

CVSS: 5.4EPSS: 0%CPEs: 3EXPL: 2

Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key. El emparejamiento heredado y la identificación de emparejamiento de conexiones seguras en Bluetooth BR / EDR Core Specification v5.2 y anteriores pueden permitir que un usuario no identificado complete la autenticación sin emparejar credenciales a través de acceso adyacente. Un atacante adyacente no autenticado podría hacerse pasar por un maestro o esclavo Bluetooth BR / EDR para emparejarse con un dispositivo remoto previamente emparejado para completar con éxito el procedimiento de autenticación sin conocer la clave de enlace A flaw was discovered in the Bluetooth protocol affecting the Bluetooth BR/EDR authentication. An attacker with physical access to the Bluetooth connection could perform a spoofing attack impersonating the address of a previously paired remote device. • https://github.com/m4rm0k/CVE-2020-10135-BIAS http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html http://seclists.org/fulldisclosure/2020/Jun/5 https://francozappa.github.io/about-bias https://kb.cert.org/vuls/id/647177 https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-securit • CWE-290: Authentication Bypass by Spoofing CWE-757: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') •

CVSS: 8.8EPSS: 71%CPEs: 4EXPL: 0

The Bluetooth Stack 2.1 in Microsoft Windows Vista SP1 and SP2 and Windows 7 Gold and SP1 does not prevent access to objects in memory that (1) were not properly initialized or (2) have been deleted, which allows remote attackers to execute arbitrary code via crafted Bluetooth packets, aka "Bluetooth Stack Vulnerability." La pila de Bluetooth v2.1 en Microsoft Windows Vista SP1 y SP2 y Windows 7 Gold y SP1 no impide el acceso a los objetos en la memoria que (1) no se ha inicializado correctamente o (2) se han eliminado, lo que permite a atacantes remotos ejecutar código arbitrario a través de paquetes Bluetooth manipulados, también conocido como "Vulnerabilidad de la pila de Bluetooth". • http://www.us-cert.gov/cas/techalerts/TA11-193A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-053 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12094 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the Bluesoil Bluetooth stack has unknown impact and attack vectors. Vulnerabilidad no especificada en la pila Bluetooth de Bluesoil tiene impacto y vectores de ataque desconocidos. • http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://osvdb.org/37591 http://www.securityfocus.com/archive/1/455889/100/0/threaded •