Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Adjacent_network
0

CVE-2020-26558

Disclosure Date: May 24, 2021
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
4.2 Medium
Impact Score:
2.5
Exploitability Score:
1.6
Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector (AV):
Adjacent_network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
Low
Integrity (I):
Low
Availability (A):
None

General Information

Vendors

  • bluetooth,
  • debian,
  • fedoraproject,
  • intel,
  • linux

Products

  • ac 1550 firmware -,
  • ac 3165 firmware -,
  • ac 3168 firmware -,
  • ac 7265 firmware -,
  • ac 8260 firmware -,
  • ac 8265 firmware -,
  • ac 9260 firmware -,
  • ac 9461 firmware -,
  • ac 9462 firmware -,
  • ac 9560 firmware -,
  • ax1650 firmware -,
  • ax1675 firmware -,
  • ax200 firmware -,
  • ax201 firmware -,
  • ax210 firmware -,
  • bluetooth core specification,
  • debian linux 9.0,
  • fedora 34,
  • linux kernel
Technical Analysis