Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Bluetooth Core 授权问题漏洞
Vulnerability Description
Bluetooth Core 4.2版本和5.0版本中存在安全漏洞。该漏洞源于蓝牙双模式功能。攻击者可利用该漏洞覆盖蓝牙认证密钥。
CVSS Information
N/A
Vulnerability Type
N/A