Bug 1918602 (CVE-2020-26558) - CVE-2020-26558 bluez: Passkey Entry protocol of the Bluetooth Core is vulnerable to an impersonation attack
Summary: CVE-2020-26558 bluez: Passkey Entry protocol of the Bluetooth Core is vulnera...
Keywords:
Status: NEW
Alias: CVE-2020-26558
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1966413 1966414 1919285 1919286 1960000 1960001 1960003 1964968 1965051 1965057 1965058
Blocks: 1969593
TreeView+ depends on / blocked
 
Reported: 2021-01-21 08:03 UTC by Dhananjay Arunesh
Modified: 2024-03-03 11:59 UTC (History)
77 users (show)

Fixed In Version: bluez 5.57, bluez 5.58
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in the bluez, where Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge.
Clone Of:
Environment:
Last Closed: 2021-11-09 20:23:54 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4432 0 None None None 2021-11-09 18:46:02 UTC

Description Dhananjay Arunesh 2021-01-21 08:03:05 UTC
A vulnerability was found in Linux Kernel, where Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge.

Refer:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f

Comment 6 Rohit Keshri 2021-05-12 19:00:00 UTC
Mitigation:

Devices should not accept their own public key from a peer during a pairing session. The pairing procedure should be terminated with a failure status if this occurs.

Comment 12 Rohit Keshri 2021-05-26 12:59:12 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1964968]

Comment 14 msiddiqu 2021-05-26 16:43:24 UTC
Created bluez tracking bugs for this issue:

Affects: fedora-all [bug 1965051]

Comment 20 errata-xmlrpc 2021-11-09 18:46:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4432 https://access.redhat.com/errata/RHSA-2021:4432

Comment 21 Product Security DevOps Team 2021-11-09 20:23:50 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-26558


Note You need to log in before you can comment on or make changes to this bug.