Bug 2253391 (CVE-2023-45866) - CVE-2023-45866 bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution
Summary: CVE-2023-45866 bluez: unauthorized HID device connections allows keystroke in...
Keywords:
Status: NEW
Alias: CVE-2023-45866
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2253392
Blocks: 2253393
TreeView+ depends on / blocked
 
Reported: 2023-12-07 05:02 UTC by TEJ RATHI
Modified: 2024-12-17 18:57 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:11154 0 None None None 2024-12-17 18:57:50 UTC
Red Hat Product Errata RHSA-2024:9413 0 None None None 2024-11-12 10:45:18 UTC

Description TEJ RATHI 2023-12-07 05:02:07 UTC
The HID Profile in multiple Bluetooth host stacks may accept connections with the HID control and HID interrupt channels of the HID Host role without MITM protection/mitigation and without user confirmation on the Central role device. This can permit a device like a keyboard (or emulating a keyboard) to successfully connect to a discoverable device without confirmation and permit keystroke injection.

Patch: 
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=25a471a83e02e1effb15d5a488b3f0085eaeb675

Comment 1 TEJ RATHI 2023-12-07 05:02:27 UTC
Created bluez tracking bugs for this issue:

Affects: fedora-all [bug 2253392]

Comment 3 errata-xmlrpc 2024-11-12 10:45:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:9413 https://access.redhat.com/errata/RHSA-2024:9413

Comment 4 errata-xmlrpc 2024-12-17 18:57:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:11154 https://access.redhat.com/errata/RHSA-2024:11154


Note You need to log in before you can comment on or make changes to this bug.