CVE-2020-6616
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Some Broadcom chips mishandle Bluetooth random-number generation because a low-entropy Pseudo Random Number Generator (PRNG) is used in situations where a Hardware Random Number Generator (HRNG) should have been used to prevent spoofing. This affects, for example, Samsung Galaxy S8, S8+, and Note8 devices with the BCM4361 chipset. The Samsung ID is SVE-2020-16882 (May 2020).
Algunos chips Broadcom manejan inapropiadamente la generación de números aleatorios de Bluetooth porque es usado un Pseudo Random Number Generator (PRNG) de baja entropía en situaciones en las que debería haberse utilizado un Hardware Random Number Generator (HRNG) para impedir la suplantación de identidad. Esto afecta, por ejemplo, a los dispositivos Samsung Galaxy S8, S8+ y Note8 con el chipset BCM4361. El ID de Samsung es SVE-2020-16882 (Mayo de 2020).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-08 CVE Reserved
- 2020-05-08 CVE Published
- 2024-04-14 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://bluetooth.lol | Third Party Advisory | |
http://seclists.org/fulldisclosure/2020/May/49 | Mailing List | |
https://github.com/seemoo-lab/internalblue/blob/master/doc/rng.md | Third Party Advisory | |
https://support.apple.com/HT211168 | Third Party Advisory | |
https://support.apple.com/kb/HT211100 | Third Party Advisory | |
https://support.apple.com/kb/HT211168 | Third Party Advisory | |
https://twitter.com/naehrdine/status/1255980443368919045 | Third Party Advisory | |
https://twitter.com/naehrdine/status/1255981245147877377 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://media.ccc.de/v/DiVOC-6-finding_eastereggs_in_broadcom_s_bluetooth_random_number_generator | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.samsungmobile.com/securityUpdate.smsb | 2023-01-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Android Search vendor "Google" for product "Android" | - | - |
Affected
| in | Samsung Search vendor "Samsung" | Galaxy Note8 Search vendor "Samsung" for product "Galaxy Note8" | - | - |
Safe
|
Google Search vendor "Google" | Android Search vendor "Google" for product "Android" | - | - |
Affected
| in | Samsung Search vendor "Samsung" | Galaxy S8 Search vendor "Samsung" for product "Galaxy S8" | - | - |
Safe
|
Google Search vendor "Google" | Android Search vendor "Google" for product "Android" | - | - |
Affected
| in | Samsung Search vendor "Samsung" | Galaxy S8 Plus Search vendor "Samsung" for product "Galaxy S8 Plus" | - | - |
Safe
|
Apple Search vendor "Apple" | Ipados Search vendor "Apple" for product "Ipados" | < 13.5 Search vendor "Apple" for product "Ipados" and version " < 13.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | < 13.5 Search vendor "Apple" for product "Iphone Os" and version " < 13.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | >= 10.13.0 < 10.13.6 Search vendor "Apple" for product "Mac Os X" and version " >= 10.13.0 < 10.13.6" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | >= 10.14.0 < 10.14.6 Search vendor "Apple" for product "Mac Os X" and version " >= 10.14.0 < 10.14.6" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | >= 10.15 < 10.15.4 Search vendor "Apple" for product "Mac Os X" and version " >= 10.15 < 10.15.4" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2018-002 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2018-003 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2019-001 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2019-002 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2019-003 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2019-004 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2019-005 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2019-006 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2019-007 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | security_update_2020-001 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | supplemental_update |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | security_update_2019-001 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | security_update_2019-002 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | security_update_2019-004 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | security_update_2019-005 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | security_update_2019-006 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | security_update_2019-007 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | security_update_2020-001 |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | supplemental_update |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | supplemental_update_2 |
Affected
|