8.1 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
8.5 High
AI Score
Confidence
High
4.8 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:L/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
41.7%
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka “KNOB”) that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
CPE | Name | Operator | Version |
---|---|---|---|
iphone_os | eq | 12.4 | |
mac_os_x | eq | 10.12.6 | |
mac_os_x | eq | 10.13.6 | |
mac_os_x | eq | 10.14.5 | |
tvos | eq | 12.4 | |
watchos | eq | 5.3 | |
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 19.04 | |
ubuntu_linux | eq | 16.04 | |
debian_linux | eq | 8.0 |
lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
seclists.org/fulldisclosure/2019/Aug/11
seclists.org/fulldisclosure/2019/Aug/13
seclists.org/fulldisclosure/2019/Aug/14
seclists.org/fulldisclosure/2019/Aug/15
www.cs.ox.ac.uk/publications/publication12404-abstract.html
www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en
access.redhat.com/errata/RHSA-2019:2975
access.redhat.com/errata/RHSA-2019:3055
access.redhat.com/errata/RHSA-2019:3076
access.redhat.com/errata/RHSA-2019:3089
access.redhat.com/errata/RHSA-2019:3165
access.redhat.com/errata/RHSA-2019:3187
access.redhat.com/errata/RHSA-2019:3217
access.redhat.com/errata/RHSA-2019:3218
access.redhat.com/errata/RHSA-2019:3220
access.redhat.com/errata/RHSA-2019:3231
access.redhat.com/errata/RHSA-2019:3309
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/errata/RHSA-2020:0204
lists.debian.org/debian-lts-announce/2019/09/msg00014.html
lists.debian.org/debian-lts-announce/2019/09/msg00015.html
lists.debian.org/debian-lts-announce/2019/09/msg00025.html
usn.ubuntu.com/4115-1/
usn.ubuntu.com/4118-1/
usn.ubuntu.com/4147-1/
www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/
www.kb.cert.org/vuls/id/918987/
www.usenix.org/conference/usenixsecurity19/presentation/antonioli
8.1 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
8.5 High
AI Score
Confidence
High
4.8 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:L/Au:N/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
41.7%