Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
History
No history.
Information
Published : 2023-12-08 06:15
Updated : 2024-01-05 13:15
NVD link : CVE-2023-45866
Mitre link : CVE-2023-45866
CVE.ORG link : CVE-2023-45866
JSON object : View
Products Affected
bluproducts
- dash
apple
- macos
- ipad_os
- macbook_pro
- iphone_os
- iphone_se
- macbook_air
- nexus_5
- pixel_7
- pixel_2
- pixel_4a
- android
- pixel_6
canonical
- ubuntu_linux
fedoraproject
- fedora
debian
- debian_linux
CWE
CWE-287
Improper Authentication