2.9
CVSSv2

CVE-2020-26556

Published: 24/05/2021 Updated: 29/04/2022
CVSS v2 Base Score: 2.9 | Impact Score: 2.9 | Exploitability Score: 5.5
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 259
Vector: AV:A/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A flaw was found in the Linux kernel’s authentication protocol in the Bluetooth® Mesh Profile Specification. A vulnerability occurs if the AuthValue is identified during the provisioning procedure, even if the AuthValue is selected randomly. This flaw allows an malicious user to identify the AuthValue used before the provisioning procedure times out, possibly completing the provisioning operation and obtaining a NetKey. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bluetooth mesh profile 1.0.0

bluetooth mesh profile 1.0.1

bluetooth bluetooth core specification

Vendor Advisories

Debian Bug report logs - #1006406 BlueMirror mesh attacks - CVE-2020-26556, CVE-2020-26557, CVE-2020-26559, CVE-2020-26560 Package: src:bluez; Maintainer for src:bluez is Debian Bluetooth Maintainers <team+pkg-bluetooth@trackerdebianorg>; Reported by: Ben Hutchings <ben@decadentorguk> Date: Fri, 25 Feb 2022 02:30: ...
A flaw was found in the Linux kernel’s authentication protocol in the Bluetooth® Mesh Profile Specification A vulnerability occurs if the AuthValue is identified during the provisioning procedure, even if the AuthValue is selected randomly This flaw allows an attacker to identify the AuthValue used before the provisioning proced ...
Mesh Provisioning in the Bluetooth Mesh profile 10 and 101 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently random AuthValue before the provisioning procedure times out, to complete authentication by leveraging Malleable Commitment ...