First published: Mon Dec 19 2022(Updated: )
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) allows attackers to bypass passkey entry in legacy pairing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microchip Bm78 Firmware | =1.43 | |
Microchip Bm78 | ||
Microchip Bm83 Firmware | =1.43 | |
Microchip Bm83 | ||
Microchip Rn4870 Firmware | =1.43 | |
Microchip RN4870 | ||
Microchip Rn4871 Firmware | =1.43 | |
Microchip Rn4871 | ||
Microchip Bm70 Firmware | =1.43 | |
Microchip Bm70 | ||
Microchip Bm71 Firmware | =1.43 | |
Microchip Bm71 | ||
Microchip Pic Lightblue Explorer Demo Firmware | =4.2_dt100112 | |
Microchip PIC LightBlue Explorer Demo | ||
Microchip Is1870 Firmware | =1.43 | |
Microchip Is1870 | ||
Microchip Is1871 Firmware | =1.43 | |
Microchip Is1871 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-46400.
The severity level of CVE-2022-46400 is medium with a CVSS score of 5.4.
The Microchip RN4870 module firmware 1.43 and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112 are affected by CVE-2022-46400.
Attackers can exploit CVE-2022-46400 to bypass passkey entry in legacy pairing.
Yes, you can find references for CVE-2022-46400 at the following links: [link1], [link2], [link3].