First published: Tue Jun 09 2020(Updated: )
The Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64 generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits during BLE pairing. This is the case for both authenticated and unauthenticated pairing with both LE Secure Connections as well as LE Legacy Pairing. A predictable or brute-forceable random number allows an attacker (in radio range) to perform a MITM attack during BLE pairing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cypress Psoc 4.2 Ble | <3.64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-11957.
The severity of CVE-2020-11957 is high (7.5).
The affected software is Cypress PSoC Creator BLE 4.2 component versions before 3.64.
CVE-2020-11957 is a vulnerability in the Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64, which generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits during BLE pairing.
To fix CVE-2020-11957, update the Cypress PSoC Creator BLE 4.2 component to version 3.64 or later.