First published: Thu Jan 21 2021(Updated: )
A vulnerability was found in Linux Kernel, where Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge. Refer: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bluez | <0:5.56-1.el8 | 0:5.56-1.el8 |
redhat/bluez | <5.57 | 5.57 |
Android | ||
debian/bluez | 5.55-3.1+deb11u1 5.55-3.1+deb11u2 5.66-1+deb12u2 5.66-1+deb12u1 5.79-1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Bluetooth Core Specification | >=2.1<=5.2 | |
Fedora | =34 | |
Debian | =9.0 | |
Linux kernel | <5.13 | |
All of | ||
intel ax210 firmware | ||
intel ax210 | ||
All of | ||
intel ax201 firmware | ||
intel ax201 | ||
All of | ||
intel ax200 firmware | ||
intel ax200 | ||
All of | ||
Intel AMT AC 9560 Firmware | ||
Intel Wireless-AC 9560 | ||
All of | ||
intel ac 9462 firmware | ||
intel ac 9462 | ||
All of | ||
intel ac 9461 firmware | ||
intel ac 9461 | ||
All of | ||
intel ac 9260 firmware | ||
intel ac 9260 | ||
All of | ||
intel ac 8265 firmware | ||
Intel AMT AC 8265 | ||
All of | ||
intel ac 8260 firmware | ||
intel ac 8260 | ||
All of | ||
Intel AC3168 Firmware | ||
Intel AC3168 Firmware | ||
All of | ||
Intel 7265 firmware | ||
Intel Wireless 7265 | ||
All of | ||
intel ac 3165 firmware | ||
intel ac 3165 | ||
All of | ||
intel ax1675 firmware | ||
intel ax1675 | ||
All of | ||
intel ax1650 firmware | ||
intel ax1650 | ||
All of | ||
intel ac 1550 firmware | ||
Intel Killer Wireless-ac 1550 | ||
intel ax210 firmware | ||
intel ax210 | ||
intel ax201 firmware | ||
intel ax201 | ||
intel ax200 firmware | ||
intel ax200 | ||
Intel AMT AC 9560 Firmware | ||
Intel Wireless-AC 9560 | ||
intel ac 9462 firmware | ||
intel ac 9462 | ||
intel ac 9461 firmware | ||
intel ac 9461 | ||
intel ac 9260 firmware | ||
intel ac 9260 | ||
intel ac 8265 firmware | ||
Intel AMT AC 8265 | ||
intel ac 8260 firmware | ||
intel ac 8260 | ||
Intel AC3168 Firmware | ||
Intel AC3168 Firmware | ||
Intel 7265 firmware | ||
Intel Wireless 7265 | ||
intel ac 3165 firmware | ||
intel ac 3165 | ||
intel ax1675 firmware | ||
intel ax1675 | ||
intel ax1650 firmware | ||
intel ax1650 | ||
intel ac 1550 firmware | ||
Intel Killer Wireless-ac 1550 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26558 is classified as a high severity vulnerability due to the potential for active impersonation attacks.
To fix CVE-2020-26558, update the affected software packages to the specified versions or later, such as bluez version 5.57 or higher.
CVE-2020-26558 affects various versions of the bluez package and the Linux kernel, among others that implement Bluetooth Core Specification.
CVE-2020-26558 is associated with impersonation attacks that can be executed by an active attacker during Bluetooth pairing processes.
CVE-2020-26558 impacts multiple operating systems including those using specific versions of the Linux Kernel and bluez packages.