CVE-2023-45866

Summary

CVECVE-2023-45866
StateRESERVED
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-12-08 06:15:00 UTC
Updated2024-01-05 13:15:00 UTC
Description** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Risk And Classification

Problem Types: CWE-287

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Apple Ipad Os All All All All
Operating System Apple Iphone Os All All All All
Operating System Apple Iphone Os 16.6 All All All
Hardware Apple Iphone Se - All All All
Hardware Apple Macbook Air 2017 All All All
Hardware Apple Macbook Pro m2 All All All
Operating System Apple Macos All All All All
Operating System Apple Macos 12.6.7 All All All
Operating System Apple Macos 13.3.3 All All All
Hardware Bluproducts Dash 3.5 All All All
Operating System Canonical Ubuntu Linux 18.04 All All All
Operating System Canonical Ubuntu Linux 20.04 All All All
Operating System Canonical Ubuntu Linux 22.04 All All All
Operating System Canonical Ubuntu Linux 23.10 All All All
Operating System Debian Debian Linux 10.0 All All All
Operating System Fedoraproject Fedora 38 All All All
Operating System Fedoraproject Fedora 39 All All All
Operating System Google Android 10.0 All All All
Operating System Google Android 11.0 All All All
Operating System Google Android 13.0 All All All
Operating System Google Android 14.0 All All All
Operating System Google Android 4.2.2 All All All
Operating System Google Android 6.0.1 All All All
Hardware Google Nexus 5 - All All All
Hardware Google Pixel 2 - All All All
Hardware Google Pixel 4a - All All All
Hardware Google Pixel 6 - All All All
Hardware Google Pixel 7 - All All All

References

ReferenceSourceLinkTags
FEDORA-2023-26a02512e1 lists.fedoraproject.org Mailing List
git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input git.kernel.org Mailing List, Patch
[debian-lts-announce] 20231215 [SECURITY] [DLA 3689-1] bluez security update lists.debian.org Mailing List, Third Party Advisory
changelogs.ubuntu.com/changelogs/pool/main/b/bluez/bluez_5.64-0ubuntu1/changelog changelogs.ubuntu.com Release Notes
About the security content of macOS Sonoma 14.2 - Apple Support support.apple.com Third Party Advisory
Full Disclosure: APPLE-SA-12-11-2023-2 iOS 17.2 and iPadOS 17.2 seclists.org Mailing List, Third Party Advisory
bluetooth.com bluetooth.com Not Applicable
FEDORA-2023-6a3fe615d3 lists.fedoraproject.org Mailing List
github.com/skysafe/reblog/tree/main/cve-2023-45866 github.com Third Party Advisory
About the security content of iOS 17.2 and iPadOS 17.2 - Apple Support support.apple.com Third Party Advisory
Full Disclosure: APPLE-SA-12-11-2023-4 macOS Sonoma 14.2 seclists.org Mailing List, Third Party Advisory
DSA-5584 www.debian.org
GLSA-202401-03 security.gentoo.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 199986 Ubuntu Security Notification for BlueZ Vulnerability (USN-6540-1)
  • 284803 Fedora Security Update for bluez (FEDORA-2023-26a02512e1)
  • 285104 Fedora Security Update for bluez (FEDORA-2023-6a3fe615d3)
  • 379125 Apple macOS Sonoma 14.2 Not Installed (HT214036)
  • 6000385 Debian Security Update for bluez (DLA 3689-1)
  • 6000396 Debian Security Update for bluez (DSA 5584-1)
  • 610527 Google Android Devices December 2023 Security Patch Missing
  • 610531 Apple iOS 17.2 and iPadOS 17.2 Security Update Missing
  • 610556 Google Android April 2024 Security Patch Missing for Huawei EMUI
  • 710821 Gentoo Linux BlueZ Privilege Escalation Vulnerability (GLSA 202401-03)
  • 907739 Common Base Linux Mariner (CBL-Mariner) Security Update for bluez (32161-1)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report