Unknown
CVE-2020-26558
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2020-26558
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- bluetooth,
- debian,
- fedoraproject,
- intel,
- linux
Products
- ac 1550 firmware -,
- ac 3165 firmware -,
- ac 3168 firmware -,
- ac 7265 firmware -,
- ac 8260 firmware -,
- ac 8265 firmware -,
- ac 9260 firmware -,
- ac 9461 firmware -,
- ac 9462 firmware -,
- ac 9560 firmware -,
- ax1650 firmware -,
- ax1675 firmware -,
- ax200 firmware -,
- ax201 firmware -,
- ax210 firmware -,
- bluetooth core specification,
- debian linux 9.0,
- fedora 34,
- linux kernel
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: