CVE-2020-12352
Linux Kernel 5.4 - 'BleedingTooth' Bluetooth Zero-Click Remote Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
Un control de acceso inapropiado en BlueZ puede permitir a un usuario no autenticado habilitar potencialmente una divulgación de información por medio de un acceso adyacente
An information leak flaw was found in the way Linux kernel’s Bluetooth stack implementation handled initialization of stack memory when handling certain AMP (Alternate MAC-PHY Manager Protocol) packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-04-28 CVE Reserved
- 2020-10-20 CVE Published
- 2021-04-08 First Exploit
- 2024-08-04 CVE Updated
- 2024-10-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-201: Insertion of Sensitive Information Into Sent Data
- CWE-909: Missing Initialization of Resource
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html | Third Party Advisory | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/49754 | 2021-04-08 | |
http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSN-0074-1.html | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2020-12352 | 2020-11-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1886529 | 2020-11-10 | |
https://access.redhat.com/security/vulnerabilities/BleedingTooth | 2020-11-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.4 < 5.4.72 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.4 < 5.4.72" | - |
Affected
| in | Bluez Search vendor "Bluez" | Bluez Search vendor "Bluez" for product "Bluez" | * | - |
Safe
|
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.8.0 < 5.8.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.8.0 < 5.8.16" | - |
Affected
| in | Bluez Search vendor "Bluez" | Bluez Search vendor "Bluez" for product "Bluez" | * | - |
Safe
|
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 5.9.0 <= 5.9.13 Search vendor "Linux" for product "Linux Kernel" and version " >= 5.9.0 <= 5.9.13" | - |
Affected
| in | Bluez Search vendor "Bluez" | Bluez Search vendor "Bluez" for product "Bluez" | * | - |
Safe
|