ID CVE-2020-11957
Summary The Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64 generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits during BLE pairing. This is the case for both authenticated and unauthenticated pairing with both LE Secure Connections as well as LE Legacy Pairing. A predictable or brute-forceable random number allows an attacker (in radio range) to perform a MITM attack during BLE pairing.
References
Vulnerable Configurations
  • cpe:2.3:a:cypress:psoc_4.2_ble:*:*:*:*:*:*:*:*
    cpe:2.3:a:cypress:psoc_4.2_ble:*:*:*:*:*:*:*:*
CVSS
Base: 5.4 (as of 22-06-2020 - 13:42)
Impact:
Exploitability:
CWE CWE-331
CAPEC
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.
Access
VectorComplexityAuthentication
ADJACENT_NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:A/AC:M/Au:N/C:P/I:P/A:P
refmap via4
confirm https://www.cypress.com/file/504466/download
Last major update 22-06-2020 - 13:42
Published 09-06-2020 - 19:15
Last modified 22-06-2020 - 13:42
Back to Top