CVE-2023-24023
- EPSS 0.17%
- Published 28.11.2023 07:15:41
- Last modified 21.11.2024 07:47:16
Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption ke...
CVE-2022-24695
- EPSS 0.03%
- Published 02.06.2023 12:15:09
- Last modified 10.01.2025 19:15:28
Bluetooth Classic in Bluetooth Core Specification through 5.3 does not properly conceal device information for Bluetooth transceivers in Non-Discoverable mode. By conducting an efficient over-the-air attack, an attacker can fully extract the permanen...
CVE-2022-25836
- EPSS 0.12%
- Published 12.12.2022 04:15:09
- Last modified 22.04.2025 21:15:42
Bluetooth® Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when the MITM negotiates Legacy Passkey Pairing with the pairing In...
CVE-2022-25837
- EPSS 0.12%
- Published 12.12.2022 04:15:09
- Last modified 22.04.2025 21:15:42
Bluetooth® Pairing in Bluetooth Core Specification v1.0B through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when at least one device supports BR/EDR Secure Connections pairing and the o...
CVE-2020-35473
- EPSS 0.04%
- Published 08.11.2022 06:15:09
- Last modified 01.05.2025 18:15:46
An information leakage vulnerability in the Bluetooth Low Energy advertisement scan response in Bluetooth Core Specifications 4.0 through 5.2, and extended scan response in Bluetooth Core Specifications 5.0 through 5.2, may be used to identify device...
CVE-2021-31615
- EPSS 0.14%
- Published 25.06.2021 12:15:08
- Last modified 21.11.2024 06:06:01
Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 may permit an adjacent device to inject a crafted packet during the receive window of the listening device before the transmitting device initiates its p...
CVE-2020-26555
- EPSS 0.23%
- Published 24.05.2021 18:15:07
- Last modified 21.11.2024 05:20:04
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
CVE-2020-26556
- EPSS 1.18%
- Published 24.05.2021 18:15:07
- Last modified 21.11.2024 05:20:04
Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently random AuthValue before the provisioning procedure times out, to complete authentication by...
CVE-2020-26558
- EPSS 0.02%
- Published 24.05.2021 18:15:07
- Last modified 21.11.2024 05:20:04
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public ke...
CVE-2020-15802
- EPSS 47.74%
- Published 11.09.2020 14:15:11
- Last modified 21.11.2024 05:06:12
Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, eit...