4.8 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:L/Au:N/C:P/I:P/A:N
8.1 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
8.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
43.1%
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka “KNOB”) that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
CPE | Name | Operator | Version |
---|---|---|---|
google:android | google android | eq | - |
[
{
"platforms": [
"N/A"
],
"product": "BR/EDR ",
"vendor": "Bluetooth",
"versions": [
{
"lessThanOrEqual": "5.1",
"status": "affected",
"version": "5.1",
"versionType": "custom"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
seclists.org/fulldisclosure/2019/Aug/11
seclists.org/fulldisclosure/2019/Aug/13
seclists.org/fulldisclosure/2019/Aug/14
seclists.org/fulldisclosure/2019/Aug/15
www.cs.ox.ac.uk/publications/publication12404-abstract.html
www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en
access.redhat.com/errata/RHSA-2019:2975
access.redhat.com/errata/RHSA-2019:3055
access.redhat.com/errata/RHSA-2019:3076
access.redhat.com/errata/RHSA-2019:3089
access.redhat.com/errata/RHSA-2019:3165
access.redhat.com/errata/RHSA-2019:3187
access.redhat.com/errata/RHSA-2019:3217
access.redhat.com/errata/RHSA-2019:3218
access.redhat.com/errata/RHSA-2019:3220
access.redhat.com/errata/RHSA-2019:3231
access.redhat.com/errata/RHSA-2019:3309
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/errata/RHSA-2020:0204
lists.debian.org/debian-lts-announce/2019/09/msg00014.html
lists.debian.org/debian-lts-announce/2019/09/msg00015.html
lists.debian.org/debian-lts-announce/2019/09/msg00025.html
usn.ubuntu.com/4115-1/
usn.ubuntu.com/4118-1/
usn.ubuntu.com/4147-1/
www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/
www.kb.cert.org/vuls/id/918987/
www.usenix.org/conference/usenixsecurity19/presentation/antonioli
More
4.8 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:L/Au:N/C:P/I:P/A:N
8.1 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
8.8 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
43.1%