4.3

CVE-2020-26558

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
BluetoothBluetooth Core Specification Version >= 2.1 <= 5.2
FedoraprojectFedora Version34
DebianDebian Linux Version9.0
LinuxLinux Kernel Version < 5.13
IntelAx210 Firmware Version-
   IntelAx210 Version-
IntelAx201 Firmware Version-
   IntelAx201 Version-
IntelAx200 Firmware Version-
   IntelAx200 Version-
IntelAc 9560 Firmware Version-
   IntelAc 9560 Version-
IntelAc 9462 Firmware Version-
   IntelAc 9462 Version-
IntelAc 9461 Firmware Version-
   IntelAc 9461 Version-
IntelAc 9260 Firmware Version-
   IntelAc 9260 Version-
IntelAc 8265 Firmware Version-
   IntelAc 8265 Version-
IntelAc 8260 Firmware Version-
   IntelAc 8260 Version-
IntelAc 3168 Firmware Version-
   IntelAc 3168 Version-
IntelAc 7265 Firmware Version-
   IntelAc 7265 Version-
IntelAc 3165 Firmware Version-
   IntelAc 3165 Version-
IntelAx1675 Firmware Version-
   IntelAx1675 Version-
IntelAx1650 Firmware Version-
   IntelAx1650 Version-
IntelAc 1550 Firmware Version-
   IntelAc 1550 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.045
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.2 1.6 2.5
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
nvd@nist.gov 4.3 5.5 4.9
AV:A/AC:M/Au:N/C:P/I:P/A:N
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.