ID CVE-2019-9506
Summary The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
References
Vulnerable Configurations
  • cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
  • cpe:2.3:h:blackberry:blackberry:-:*:*:*:*:*:*:*
    cpe:2.3:h:blackberry:blackberry:-:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:iphone_os:12.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:iphone_os:12.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.12.6:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.12.6:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.13.6:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.13.6:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:tvos:12.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:tvos:12.4:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:watchos:5.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:watchos:5.3:*:*:*:*:*:*:*
CVSS
Base: 4.8 (as of 28-08-2019 - 11:15)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
ADJACENT_NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:A/AC:L/Au:N/C:P/I:P/A:N
Last major update 28-08-2019 - 11:15
Published 14-08-2019 - 17:15
Back to Top