In the COVIDSafe application through 1.0.21 for Android, unsafe use of the Bluetooth transport option in the GATT connection allows attackers to trick the application into establishing a connection over Bluetooth BR/EDR transport, which reveals the public Bluetooth address of the victim's phone without authorisation, bypassing the Bluetooth address randomisation protection in the user's phone.
References
Link | Resource |
---|---|
https://covidsafe.watch/issue-register/ | Vendor Advisory |
https://github.com/AU-COVIDSafe/mobile-android/blob/b827cf3ccef72a3d38c6fc37466a99868823540f/app/src/main/java/au/gov/health/covidsafe/streetpass/Work.kt#L35-L41 | Exploit Third Party Advisory |
https://github.com/alwentiu/CVE-2020-14292 | Exploit Third Party Advisory |
https://www.health.gov.au/resources/apps-and-tools/covidsafe-app | Product Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-09T16:11:54
Updated: 2020-09-09T16:11:54
Reserved: 2020-06-17T00:00:00
Link: CVE-2020-14292
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-09T17:15:25.510
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-14292
JSON object: View
Redhat Information
No data.
CWE