// For flags

CVE-2021-0129

kernel: Improper access control in BlueZ may allow information disclosure vulnerability.

Severity Score

5.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.

Un control de acceso inapropiado en BlueZ puede permitir a un usuario autenticado permitir potencialmente una divulgación de información por medio de un acceso adyacente

A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.

Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. It was discovered that the aufs file system in the Linux kernel did not properly restrict mount namespaces, when mounted with the non-default allow_userns option set. A local attacker could use this to gain administrative privileges.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-22 CVE Reserved
  • 2021-06-09 CVE Published
  • 2024-08-03 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.12 < 4.4.270
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.12 < 4.4.270"
-
Safe
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.9 < 4.9.270
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.9 < 4.9.270"
-
Safe
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.14 < 4.14.234
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.14 < 4.14.234"
-
Safe
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.19 < 4.19.192
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.19 < 4.19.192"
-
Safe
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.4 < 5.4.122
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.4 < 5.4.122"
-
Safe
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.10 < 5.10.40
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.10 < 5.10.40"
-
Safe
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 5.12 < 5.12.7
Search vendor "Linux" for product "Linux Kernel" and version " >= 5.12 < 5.12.7"
-
Safe
Bluez
Search vendor "Bluez"
Bluez
Search vendor "Bluez" for product "Bluez"
< 5.57
Search vendor "Bluez" for product "Bluez" and version " < 5.57"
-
Affected
in Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
5.13
Search vendor "Linux" for product "Linux Kernel" and version "5.13"
rc1
Safe
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
7.0
Search vendor "Redhat" for product "Enterprise Linux" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
8.0
Search vendor "Redhat" for product "Enterprise Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected