Published: 11/09/2020 Updated: 13/11/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Devices supporting Bluetooth prior to 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bluetooth bluetooth core specification

Recent Articles

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks
Threatpost • Lindsey O'Donnell • 10 Sep 2020

A high-severity Bluetooth vulnerability has been uncovered, which could enable an unauthenticated attacker within wireless range to eavesdrop or alter communications between paired devices.
The flaw (CVE-2020-15802), discovered independently by researchers at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University, is being referred to as “BLURtooth.” The issue exists in the pairing process for Bluetooth 4.0 through 5.0 implementations. This pairing process is call...

The Register

The Bluetooth Special Interest Group has admitted some previous iterations of its technology had a flaw that could be exploited to hijack or eavesdrop on nearby connections.
Named BLURtooth, aka CVE-2020-15802, the flaw was present in the Bluetooth BR/EDR (Bluetooth Basic Rate/Enhanced Data Rate) from specification version 4.2 to 5.0. The latest version of the Bluetooth spec is 5.2.
Version 4.2 debuted in December 2014 and version 5.0 came along two years later. In 2015 alone the wor...