First published: Fri Jun 01 2018(Updated: )
A vulnerability in Bluetooth pairing potentially allows an attacker with physical proximity (within 30 meters) to gain unauthorized access via an adjacent network, intercept traffic and send forged pairing messages between two vulnerable Bluetooth devices. This may result in information disclosure, elevation of privilege and/or denial of service. External References: <a href="https://www.kb.cert.org/vuls/id/304725">https://www.kb.cert.org/vuls/id/304725</a> <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00128.html">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00128.html</a> <a href="https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update">https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update</a>
Credit: Lior Neumann Eli Biham Lior Neumann Eli Biham Lior Neumann Eli Biham Lior Neumann Eli Biham Lior Neumann Eli Biham cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Mojave | <10.14 | 10.14 |
Apple macOS High Sierra | <10.13.6 | 10.13.6 |
Apple Sierra | ||
Apple El Capitan | ||
Apple tvOS | <12 | 12 |
Apple iOS | <12 | 12 |
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 | |
Apple iPhone OS | <11.4 | |
Apple Mac OS X | <10.13 | |
Google Android | ||
debian/firmware-nonfree | 20210315-3 20230210-5 20240909-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)