CVE-2020-10135
Summary
| CVE | CVE-2020-10135 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-19 16:15:00 UTC |
| Updated | 2021-12-21 12:42:00 UTC |
| Description | Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Bluetooth Impersonation Attack (BIAS) Proof Of Concept ≈ Packet Storm |
MISC |
packetstormsecurity.com |
Third Party Advisory, VDB Entry |
| Full Disclosure: BIAS (Bluetooth Impersonation Attack) CVE 2020-10135 reproduction |
FULLDISC |
seclists.org |
Exploit, Mailing List, Third Party Advisory |
| VU#647177 - Bluetooth devices supporting BR/EDR are vulnerable to impersonation attacks |
CERT-VN |
kb.cert.org |
Third Party Advisory, US Government Resource |
| Security Notice | Bluetooth® Technology Website |
CONFIRM |
www.bluetooth.com |
Vendor Advisory |
| [security-announce] openSUSE-SU-2020:1236-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| [security-announce] openSUSE-SU-2020:1153-1: important: Security update |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| Search |
MISC |
francozappa.github.io |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174728 SUSE Enterprise Linux Security update for the Linux Kernel (SUSE-SU-2020:2122-1)
- 750376 OpenSUSE Security Update for RT kernel (openSUSE-SU-2021:0242-1)