{"api_version":"1","generated_at":"2026-04-23T04:09:50+00:00","cve":"CVE-2020-26558","urls":{"html":"https://cve.report/CVE-2020-26558","api":"https://cve.report/api/cve/CVE-2020-26558.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-26558","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-26558"},"summary":{"title":"CVE-2020-26558","description":"Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-05-24 18:15:00","updated_at":"2023-11-07 03:20:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://kb.cert.org/vuls/id/799380","name":"https://kb.cert.org/vuls/id/799380","refsource":"MISC","tags":[],"title":"VU#799380 - Devices supporting Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html","refsource":"CONFIRM","tags":[],"title":"INTEL-SA-00520","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2021/dsa-4951","name":"DSA-4951","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4951-1 bluez","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202209-16","name":"GLSA-202209-16","refsource":"GENTOO","tags":[],"title":"BlueZ: Multiple Vulnerabilities (GLSA 202209-16) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html","refsource":"CONFIRM","tags":[],"title":"INTEL-SA-00517","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html","name":"[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2689-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html","name":"[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2692-1] bluez security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html","name":"[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2690-1] linux-4.19 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/","name":"FEDORA-2021-a35b44fd9f","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: kernel-5.12.7-300.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/","name":"FEDORA-2021-a35b44fd9f","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: kernel-5.12.7-300.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/","name":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/","refsource":"MISC","tags":[],"title":"Reporting Security Vulnerabilities | Bluetooth® Technology Website","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-26558","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26558","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"5.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bluetooth","cpe5":"bluetooth_core_specification","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_1550","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_1550_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_3165","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_3165_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_3168","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_3168_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_7265","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_7265_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_8260","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_8260_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_8265","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_8265_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_9260","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_9260_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_9461","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_9461_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_9462","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_9462_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ac_9560","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ac_9560_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ax1650","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ax1650_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ax1675","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ax1675_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ax200","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ax200_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ax201","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ax201_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"intel","cpe5":"ax210","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"intel","cpe5":"ax210_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"26558","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-26558","qid":"159514","title":"Oracle Enterprise Linux Security Update for bluez (ELSA-2021-4432)"},{"cve":"CVE-2020-26558","qid":"178679","title":"Debian Security Update for linux-4.19 (DLA 2690-1)"},{"cve":"CVE-2020-26558","qid":"178680","title":"Debian Security Update for linux (DLA 2689-1)"},{"cve":"CVE-2020-26558","qid":"178684","title":"Debian Security Update for bluez (DLA 2692-1)"},{"cve":"CVE-2020-26558","qid":"178745","title":"Debian Security Update for bluez (DSA 4951-1)"},{"cve":"CVE-2020-26558","qid":"198407","title":"Ubuntu Security Notification for BlueZ vulnerabilities (USN-4989-1)"},{"cve":"CVE-2020-26558","qid":"198438","title":"Ubuntu Security Notification for Linux kernel vulnerabilities (USN-5017-1) (Sequoia)"},{"cve":"CVE-2020-26558","qid":"198459","title":"Ubuntu Security Notification for Linux, Linux-aws, Linux-aws-hwe, Linux-azure, Linux-azure-4.15, Linux-gcp, (USN-5018-1)"},{"cve":"CVE-2020-26558","qid":"198465","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5046-1)"},{"cve":"CVE-2020-26558","qid":"198468","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5050-1)"},{"cve":"CVE-2020-26558","qid":"239797","title":"Red Hat Update for bluez (RHSA-2021:4432)"},{"cve":"CVE-2020-26558","qid":"281098","title":"Fedora Security Update for kernel (FEDORA-2021-a35b44fd9f)"},{"cve":"CVE-2020-26558","qid":"352489","title":"Amazon Linux Security Advisory for kernel: ALAS2-2021-1685"},{"cve":"CVE-2020-26558","qid":"352831","title":"Amazon Linux Security Advisory for kernel: ALAC2012-2021-030"},{"cve":"CVE-2020-26558","qid":"352832","title":"Amazon Linux Security Advisory for kmod-sfc: ALAC2012-2021-031"},{"cve":"CVE-2020-26558","qid":"352833","title":"Amazon Linux Security Advisory for kmod-mlx5: ALAC2012-2021-032"},{"cve":"CVE-2020-26558","qid":"353147","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-004"},{"cve":"CVE-2020-26558","qid":"353158","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-002"},{"cve":"CVE-2020-26558","qid":"610344","title":"Google Android Devices June 2021 Security Patch Missing"},{"cve":"CVE-2020-26558","qid":"610354","title":"Google Android July 2021 Security Patch Missing for LGE"},{"cve":"CVE-2020-26558","qid":"610355","title":"Google Android July 2021 Security Patch Missing for Samsung"},{"cve":"CVE-2020-26558","qid":"610358","title":"Google Android July 2021 Security Patch Missing for Huawei EMUI"},{"cve":"CVE-2020-26558","qid":"610374","title":"Google Android October 2021 Security Patch Missing for Huawei EMUI"},{"cve":"CVE-2020-26558","qid":"610375","title":"Google Android October 2021 Security Patch Missing for Samsung"},{"cve":"CVE-2020-26558","qid":"610376","title":"Google Android October 2021 Security Patch Missing for LGE"},{"cve":"CVE-2020-26558","qid":"710631","title":"Gentoo Linux BlueZ Multiple Vulnerabilities (GLSA 202209-16)"},{"cve":"CVE-2020-26558","qid":"750748","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:2202-1)"},{"cve":"CVE-2020-26558","qid":"750750","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:2184-1)"},{"cve":"CVE-2020-26558","qid":"750753","title":"OpenSUSE Security Update for bluez (openSUSE-SU-2021:2291-1)"},{"cve":"CVE-2020-26558","qid":"750830","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2321-1)"},{"cve":"CVE-2020-26558","qid":"750832","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2324-1)"},{"cve":"CVE-2020-26558","qid":"750864","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2421-1)"},{"cve":"CVE-2020-26558","qid":"750868","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2427-1)"},{"cve":"CVE-2020-26558","qid":"750869","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2422-1)"},{"cve":"CVE-2020-26558","qid":"750877","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:2427-1)"},{"cve":"CVE-2020-26558","qid":"750880","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:2451-1)"},{"cve":"CVE-2020-26558","qid":"752696","title":"SUSE Enterprise Linux Security Update for bluez (SUSE-SU-2022:3691-1)"},{"cve":"CVE-2020-26558","qid":"752697","title":"SUSE Enterprise Linux Security Update for bluez (SUSE-SU-2022:3687-1)"},{"cve":"CVE-2020-26558","qid":"900842","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9474)"},{"cve":"CVE-2020-26558","qid":"902009","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9474-1)"},{"cve":"CVE-2020-26558","qid":"905824","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9474-2)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-26558","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/","url":"https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"},{"refsource":"MISC","name":"https://kb.cert.org/vuls/id/799380","url":"https://kb.cert.org/vuls/id/799380"},{"refsource":"FEDORA","name":"FEDORA-2021-a35b44fd9f","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/"},{"refsource":"CONFIRM","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"},{"refsource":"CONFIRM","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"},{"refsource":"DEBIAN","name":"DSA-4951","url":"https://www.debian.org/security/2021/dsa-4951"},{"refsource":"GENTOO","name":"GLSA-202209-16","url":"https://security.gentoo.org/glsa/202209-16"}]}},"nvd":{"publishedDate":"2021-05-24 18:15:00","lastModifiedDate":"2023-11-07 03:20:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.2,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.6,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:P/I:P/A:N","accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":5.5,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bluetooth:bluetooth_core_specification:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1","versionEndIncluding":"5.2","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.13","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ax210_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ax201_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ax200_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_9462_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_9461_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_3168_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_7265_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_7265:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_3165_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ax1675_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ax1650_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:intel:ac_1550_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:intel:ac_1550:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"26558","Ordinal":"187981","Title":"CVE-2020-26558","CVE":"CVE-2020-26558","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"26558","Ordinal":"1","NoteData":"Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"26558","Ordinal":"2","NoteData":"2021-05-24","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"26558","Ordinal":"3","NoteData":"2021-08-07","Type":"Other","Title":"Modified"}]}}}