First published: Fri Jun 01 2018(Updated: )
A vulnerability in Bluetooth pairing potentially allows an attacker with physical proximity (within 30 meters) to gain unauthorized access via an adjacent network, intercept traffic and send forged pairing messages between two vulnerable Bluetooth devices. This may result in information disclosure, elevation of privilege and/or denial of service. External References: <a href="https://www.kb.cert.org/vuls/id/304725">https://www.kb.cert.org/vuls/id/304725</a> <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00128.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00128.html</a> <a href="https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update">https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update</a>
Credit: Lior Neumann Eli Biham Lior Neumann Eli Biham Lior Neumann Eli Biham Lior Neumann Eli Biham Lior Neumann Eli Biham cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <12 | 12 |
Google Android | ||
debian/firmware-nonfree | 20210315-3 20230210-5 20241210-1 | |
Apple macOS | <10.14 | 10.14 |
Apple macOS | <10.13.5 | 10.13.5 |
Apple Sierra | ||
Apple El Capitan | ||
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 | |
Apple iPhone OS | <11.4 | |
macOS Yosemite | <10.13 | |
tvOS | <12 | 12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-5383 is characterized as having a high severity due to the potential for unauthorized access and information interception.
To fix CVE-2018-5383, update your affected devices to the latest versions provided by the vendor.
CVE-2018-5383 affects various devices including certain versions of Apple iOS, Android, macOS, and tvOS.
CVE-2018-5383 enables attackers to intercept traffic and send forged pairing messages between vulnerable Bluetooth devices.
An attacker exploiting CVE-2018-5383 needs to be in physical proximity, within approximately 30 meters of the targeted devices.