// For flags

CVE-2020-35693

 

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

On some Samsung phones and tablets running Android through 7.1.1, it is possible for an attacker-controlled Bluetooth Low Energy (BLE) device to pair silently with a vulnerable target device, without any user interaction, when the target device's Bluetooth is on, and it is running an app that offers a connectable BLE advertisement. An example of such an app could be a Bluetooth-based contact tracing app, such as Australia's COVIDSafe app, Singapore's TraceTogether app, or France's TousAntiCovid (formerly StopCovid). As part of the pairing process, two pieces (among others) of personally identifiable information are exchanged: the Identity Address of the Bluetooth adapter of the target device, and its associated Identity Resolving Key (IRK). Either one of these identifiers can be used to perform re-identification of the target device for long term tracking. The list of affected devices includes (but is not limited to): Galaxy Note 5, Galaxy S6 Edge, Galaxy A3, Tab A (2017), J2 Pro (2018), Galaxy Note 4, and Galaxy S5.

En algunos teléfonos y tabletas de Samsung que ejecutan Android versiones hasta 7.1.1, es posible que un dispositivo Bluetooth Low Energy (BLE) controlado por un atacante se empareje silenciosamente con un dispositivo objetivo vulnerable, sin ninguna interacción del usuario, cuando el Bluetooth del dispositivo objetivo es activado. y lo ejecuta una aplicación que ofrece un anuncio BLE conectable. Un ejemplo de una aplicación de este tipo podría ser una aplicación de rastreo de contactos basada en Bluetooth, como la aplicación COVIDSafe de Australia, la aplicación TraceTogether de Singapur o TousAntiCovid de Francia (anteriormente StopCovid). Como parte del proceso de emparejamiento, se intercambian dos piezas (entre otras) de información de identificación personal: la dirección de identidad del adaptador Bluetooth del dispositivo de destino y su clave de resolución de identidad (IRK) asociada. Cualquiera de estos identificadores se puede utilizar para llevar a cabo una reidentificación del dispositivo objetivo para un rastreo a largo plazo. La lista de dispositivos afectados incluye (pero no se limita a): Galaxy Note 5, Galaxy S6 Edge, Galaxy A3, Tab A (2017), J2 Pro (2018), Galaxy Note 4 y Galaxy S5

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-24 CVE Reserved
  • 2020-12-24 CVE Published
  • 2024-04-28 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
<= 7.1.1
Search vendor "Google" for product "Android" and version " <= 7.1.1"
-
Affected
in Samsung
Search vendor "Samsung"
Galaxy A3
Search vendor "Samsung" for product "Galaxy A3"
--
Safe
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
<= 7.1.1
Search vendor "Google" for product "Android" and version " <= 7.1.1"
-
Affected
in Samsung
Search vendor "Samsung"
Galaxy Note 4
Search vendor "Samsung" for product "Galaxy Note 4"
--
Safe
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
<= 7.1.1
Search vendor "Google" for product "Android" and version " <= 7.1.1"
-
Affected
in Samsung
Search vendor "Samsung"
Galaxy Note 5
Search vendor "Samsung" for product "Galaxy Note 5"
--
Safe
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
<= 7.1.1
Search vendor "Google" for product "Android" and version " <= 7.1.1"
-
Affected
in Samsung
Search vendor "Samsung"
Galaxy S5
Search vendor "Samsung" for product "Galaxy S5"
--
Safe
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
<= 7.1.1
Search vendor "Google" for product "Android" and version " <= 7.1.1"
-
Affected
in Samsung
Search vendor "Samsung"
Galaxy S6 Edge
Search vendor "Samsung" for product "Galaxy S6 Edge"
--
Safe
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
<= 7.1.1
Search vendor "Google" for product "Android" and version " <= 7.1.1"
-
Affected
in Samsung
Search vendor "Samsung"
J2 Pro \(2018\)
Search vendor "Samsung" for product "J2 Pro \(2018\)"
--
Safe
Google
Search vendor "Google"
Android
Search vendor "Google" for product "Android"
<= 7.1.1
Search vendor "Google" for product "Android" and version " <= 7.1.1"
-
Affected
in Samsung
Search vendor "Samsung"
Tab A \(2017\)
Search vendor "Samsung" for product "Tab A \(2017\)"
--
Safe