CVE-2022-25836

Bluetooth® Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 may permit an unauthenticated MITM to acquire credentials with two pairing devices via adjacent access when the MITM negotiates Legacy Passkey Pairing with the pairing Initiator and Secure Connections Passkey Pairing with the pairing Responder and brute forces the Passkey entered by the user into the Initiator. The MITM attacker can use the identified Passkey value to complete authentication with the Responder via Bluetooth pairing method confusion.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bluetooth:bluetooth_core_specification:*:*:*:*:*:*:*:*

History

14 Dec 2022, 17:53

Type Values Removed Values Added
CPE cpe:2.3:a:bluetooth:bluetooth_core_specification:*:*:*:*:*:*:*:*
CWE CWE-294
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (CONFIRM) https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ - (CONFIRM) https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ - Vendor Advisory
First Time Bluetooth bluetooth Core Specification
Bluetooth

12 Dec 2022, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-12 04:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-25836

Mitre link : CVE-2022-25836

CVE.ORG link : CVE-2022-25836


JSON object : View

Products Affected

bluetooth

  • bluetooth_core_specification
CWE
CWE-294

Authentication Bypass by Capture-replay