First published: Mon Jul 22 2019(Updated: )
A vulnerability affecting Bluetooth BR/EDR pairing was found in the Bluetooth Core specification versions 1.0 through 5.2. The flaw could allow an attacking device to spoof the address of a previously paired remote device to successfully complete the authentication procedure with some paired/bonded devices while not possessing the link key. This can permit an attacker to initiate the Bluetooth Key Negotiation attack (KNOB) on encryption key strength without intervening in an ongoing pairing procedure through an injection attack.
Credit: Daniele Antonioli SUTDSingapore Dr. Nils Ole Tippenhauer CISPAGermany Pr University of OxfordEngland Daniele Antonioli SUTDSingapore Dr. Nils Ole Tippenhauer CISPAGermany Pr University of OxfordEngland Daniele Antonioli SUTDSingapore Dr. Nils Ole Tippenhauer CISPAGermany Pr University of OxfordEngland Daniele Antonioli SUTDSingapore Dr. Nils Ole Tippenhauer CISPAGermany Pr University of OxfordEngland cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <5.3 | 5.3 |
Apple macOS Mojave | <10.14.6 | 10.14.6 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.4 | 12.4 |
Apple iOS | <12.4 | 12.4 |
Bluetooth Bluetooth Core | <=5.2 | |
Bluetooth Bluetooth Core | <=5.2 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)