First published: Tue Nov 08 2022(Updated: )
An information leakage vulnerability in the Bluetooth Low Energy advertisement scan response in Bluetooth Core Specifications 4.0 through 5.2, and extended scan response in Bluetooth Core Specifications 5.0 through 5.2, may be used to identify devices using Resolvable Private Addressing (RPA) by their response or non-response to specific scan requests from remote addresses. RPAs that have been associated with a specific remote device may also be used to identify a peer in the same manner by using its reaction to an active scan request. This has also been called an allowlist-based side channel.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bluetooth Bluetooth Core Specification | >=4.0<=5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35473 is an information leakage vulnerability in the Bluetooth Low Energy advertisement scan response in Bluetooth Core Specifications 4.0 through 5.2.
CVE-2020-35473 may be used to identify devices using Resolvable Private Addressing (RPA) by exploiting an information leakage vulnerability in the Bluetooth advertisement scan response.
CVE-2020-35473 has a severity score of 4.3, which is considered medium.
To mitigate CVE-2020-35473, it is recommended to update the affected software to a version that addresses the vulnerability.
More information about CVE-2020-35473 can be found in the references provided: [link1](https://dl.acm.org/doi/10.1145/3548606.3559372) and [link2](https://www.sigsac.org/ccs/CCS2022/proceedings/ccs-proceedings.html).