First published: Mon Dec 12 2022(Updated: )
Bluetooth® Pairing in Bluetooth Core Specification v1.0B through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when at least one device supports BR/EDR Secure Connections pairing and the other BR/EDR Legacy PIN code pairing if the MITM negotiates BR/EDR Secure Simple Pairing in Secure Connections mode using the Passkey association model with the pairing Initiator and BR/EDR Legacy PIN code pairing with the pairing Responder and brute forces the Passkey entered by the user into the Responder as a 6-digit PIN code. The MITM attacker can use the identified PIN code value as the Passkey value to complete authentication with the Initiator via Bluetooth pairing method confusion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bluetooth Bluetooth Core Specification | >=1.1b<=5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identifier for this issue is CVE-2022-25837.
The severity of CVE-2022-25837 is high with a severity value of 7.5.
Bluetooth Core Specification versions 1.0B through 5.3 are affected by CVE-2022-25837.
CVE-2022-25837 may permit an unauthenticated MITM (Man-in-the-Middle) attack to acquire credentials between two pairing devices via adjacent access.
To mitigate CVE-2022-25837, it is recommended to update Bluetooth devices to the latest firmware or software versions provided by the vendor.