First published: Mon Dec 12 2022(Updated: )
Bluetooth® Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when the MITM negotiates Legacy Passkey Pairing with the pairing Initiator and Secure Connections Passkey Pairing with the pairing Responder and brute forces the Passkey entered by the user into the Initiator. The MITM attacker can use the identified Passkey value to complete authentication with the Responder via Bluetooth pairing method confusion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bluetooth Bluetooth Core Specification | >=4.0<=5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25836 is a vulnerability in Bluetooth Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 that allows an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access.
The severity of CVE-2022-25836 is high with a CVSS score of 7.5.
CVE-2022-25836 affects Bluetooth Core Specification versions 4.0 through 5.3.
The impact of CVE-2022-25836 is that it allows an unauthenticated MITM to acquire credentials through adjacent access during the pairing process.
To mitigate CVE-2022-25836, it is recommended to update the affected Bluetooth devices to a version that has fixed this vulnerability.