First published: Mon Jul 22 2019(Updated: )
A vulnerability affecting Bluetooth BR/EDR pairing was found in the Bluetooth Core specification versions 1.0 through 5.2. The flaw could allow an attacking device to spoof the address of a previously paired remote device to successfully complete the authentication procedure with some paired/bonded devices while not possessing the link key. This can permit an attacker to initiate the Bluetooth Key Negotiation attack (KNOB) on encryption key strength without intervening in an ongoing pairing procedure through an injection attack.
Credit: cret@cert.org Daniele Antonioli SUTDSingapore Dr. Nils Ole Tippenhauer CISPAGermany Pr University of OxfordEngland
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <12.4 | 12.4 |
macOS Mojave | <10.14.6 | 10.14.6 |
macOS High Sierra | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <12.4 | 12.4 |
Apple iOS, iPadOS, and watchOS | <5.3 | 5.3 |
Bluetooth Core | <=5.2 | |
Bluetooth Core | <=5.2 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-10135 is considered a high severity vulnerability that affects Bluetooth pairing.
To mitigate CVE-2020-10135, ensure your affected devices are updated to the latest software versions provided by the vendor.
CVE-2020-10135 affects various Apple products including iOS, macOS Mojave, High Sierra, Sierra, watchOS, and tvOS, as well as some Bluetooth Core implementations.
Yes, CVE-2020-10135 can potentially allow an attacker to spoof a device and exploit the vulnerability within Bluetooth BR/EDR pairing.
CVE-2020-10135 affects Bluetooth Core specifications from version 1.0 through 5.2.