Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html | Broken Link Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html | Broken Link Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Jun/5 | Exploit Mailing List Third Party Advisory |
https://francozappa.github.io/about-bias/ | Third Party Advisory |
https://kb.cert.org/vuls/id/647177/ | Third Party Advisory US Government Resource |
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2020-04-14T00:00:00
Updated: 2020-11-02T15:52:55
Reserved: 2020-03-05T00:00:00
Link: CVE-2020-10135
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-05-19T16:15:11.073
Modified: 2021-12-21T12:42:21.433
Link: CVE-2020-10135
JSON object: View
Redhat Information
No data.