// For flags

CVE-2020-10134

Bluetooth devices supporting LE and specific BR/EDR implementations are vulnerable to method confusion attacks

Severity Score

6.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Pairing in Bluetooth® Core v5.2 and earlier may permit an unauthenticated attacker to acquire credentials with two pairing devices via adjacent access when the unauthenticated user initiates different pairing methods in each peer device and an end-user erroneously completes both pairing procedures with the MITM using the confirmation number of one peer as the passkey of the other. An adjacent, unauthenticated attacker could be able to initiate any Bluetooth operation on either attacked device exposed by the enabled Bluetooth profiles. This exposure may be limited when the user must authorize certain access explicitly, but so long as a user assumes that it is the intended remote device requesting permissions, device-local protections may be weakened.

El emparejamiento en Bluetooth® Core versiones v5.2 y anteriores, puede permitir a un atacante no autenticado adquirir credenciales con dos dispositivos de emparejamiento mediante un acceso adyacente cuando un usuario no autenticado inicia diferentes métodos de emparejamiento en cada dispositivo homólogo y un usuario final completa erróneamente ambos procedimientos de emparejamiento con la técnica MITM usando el número de confirmación de un peer como clave de acceso del otro. Un atacante adyacente no autenticado podría ser capaz de iniciar cualquier operación de Bluetooth en cualquier dispositivo atacado expuesto por los perfiles de Bluetooth habilitados. Esta exposición puede estar limitada cuando el usuario debe autorizar determinado acceso explícitamente, pero siempre y cuando el usuario asuma que es el dispositivo remoto deseado que requiera permisos, las protecciones locales del dispositivo pueden estar debilitadas.

*Credits: Thanks to Ludwig Peuckert and Maximilian von Tschirschnitz for reporting this vulnerability.
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-03-05 CVE Reserved
  • 2020-05-19 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-351: Insufficient Type Distinction
  • CWE-436: Interpretation Conflict
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bluetooth
Search vendor "Bluetooth"
Bluetooth Core
Search vendor "Bluetooth" for product "Bluetooth Core"
<= 5.2
Search vendor "Bluetooth" for product "Bluetooth Core" and version " <= 5.2"
br
Affected
Bluetooth
Search vendor "Bluetooth"
Bluetooth Core
Search vendor "Bluetooth" for product "Bluetooth Core"
<= 5.2
Search vendor "Bluetooth" for product "Bluetooth Core" and version " <= 5.2"
edr
Affected
Bluetooth
Search vendor "Bluetooth"
Bluetooth Core
Search vendor "Bluetooth" for product "Bluetooth Core"
<= 5.2
Search vendor "Bluetooth" for product "Bluetooth Core" and version " <= 5.2"
le
Affected