First published: Fri Sep 11 2020(Updated: )
Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bluetooth Bluetooth Core Specification | <5.1 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15802 is a vulnerability that allows man-in-the-middle attacks on devices supporting Bluetooth before version 5.1, also known as BLURtooth.
The severity of CVE-2020-15802 is high, with a severity value of 5.9.
Devices supporting Bluetooth before version 5.1, such as Google Android, are affected by CVE-2020-15802.
CVE-2020-15802 allows an unauthenticated user to establish a bonding with one transport (either LE or BR/EDR) and replace an existing bonding.
Yes, patching the affected devices to a version of Bluetooth 5.1 or newer will mitigate the vulnerability.