Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
CVE-2020-10135
Summary
Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
- LOW
- ADJACENT_NETWORK
- LOW
- UNCHANGED
- NONE
- NONE
- LOW
- NONE
CWE-757 - Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.
References
Advisory Timeline
- Published