CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
19.7%
Bluetooth Classic in Bluetooth Core Specification through 5.3 does not
properly conceal device information for Bluetooth transceivers in
Non-Discoverable mode. By conducting an efficient over-the-air attack, an
attacker can fully extract the permanent, unique Bluetooth MAC identifier,
along with device capabilities and identifiers, some of which may contain
identifying information about the device owner. This additionally allows
the attacker to establish a connection to the target device.
Author | Note |
---|---|
alexmurray | Since this vulnerability affects the Bluetooth Core Specification it may then also affect bluez on Ubuntu. At this stage there is little detail publicly available about this vulnerability though and no patch available either. |
mdeslaur | as of 2024-06-03, no software mitigation is available for this issue, marking as ignored |
launchpad.net/bugs/cve/CVE-2022-24695
nvd.nist.gov/vuln/detail/CVE-2022-24695
security-tracker.debian.org/tracker/CVE-2022-24695
sp2023.ieee-security.org/program-papers.html
www.bluetooth.com/specifications/specs/core-specification/
www.computer.org/csdl/proceedings-article/sp/2023/933600a521/1He7Yja1AYM
www.cve.org/CVERecord?id=CVE-2022-24695
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
19.7%