Description
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
Published: 2019-08-14
Score: 8.1 High
EPSS: 4.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Bluetooth SIG Expedited Errata Correction 11838

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1919-1 linux-4.9 security update
Debian DLA Debian DLA DLA-1919-2 linux-4.9 security update
Debian DLA Debian DLA DLA-1930-1 linux security update
EUVD EUVD EUVD-2019-18880 The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
Ubuntu USN Ubuntu USN USN-4115-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4118-1 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-4147-1 Linux kernel vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/Aug/11 cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/Aug/13 cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/Aug/14 cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/Aug/15 cve-icon cve-icon
http://www.cs.ox.ac.uk/publications/publication12404-abstract.html cve-icon cve-icon
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2975 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3055 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3076 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3089 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3165 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3187 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3217 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3218 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3220 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3231 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3309 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3517 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0204 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-9506 cve-icon
https://usn.ubuntu.com/4115-1/ cve-icon cve-icon
https://usn.ubuntu.com/4118-1/ cve-icon cve-icon
https://usn.ubuntu.com/4147-1/ cve-icon cve-icon
https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-9506 cve-icon
https://www.kb.cert.org/vuls/id/918987/ cve-icon cve-icon
https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli cve-icon cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.02975}

epss

{'score': 0.02341}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.03055}

epss

{'score': 0.02975}


Subscriptions

Apple Iphone Os Mac Os X Tvos Watchos
Blackberry Blackberry
Canonical Ubuntu Linux
Debian Debian Linux
Google Android
Huawei Alp-al00b Alp-al00b Firmware Ares-al00b Ares-al00b Firmware Ares-al10d Ares-al10d Firmware Ares-tl00c Ares-tl00c Firmware Asoka-al00ax Asoka-al00ax Firmware Atomu-l33 Atomu-l33 Firmware Atomu-l41 Atomu-l41 Firmware Atomu-l42 Atomu-l42 Firmware Barca-al00 Barca-al00 Firmware Berkeley-al20 Berkeley-al20 Firmware Berkeley-l09 Berkeley-l09 Firmware Berkeley-tl10 Berkeley-tl10 Firmware Bla-al00b Bla-al00b Firmware Bla-l29c Bla-l29c Firmware Bla-tl00b Bla-tl00b Firmware Cairogo-l22 Cairogo-l22 Firmware Charlotte-l29c Charlotte-l29c Firmware Columbia-al10b Columbia-al10b Firmware Columbia-al10i Columbia-al10i Firmware Columbia-l29d Columbia-l29d Firmware Columbia-tl00d Columbia-tl00d Firmware Cornell-al00a Cornell-al00a Firmware Cornell-al00i Cornell-al00i Firmware Cornell-al00ind Cornell-al00ind Firmware Cornell-al10ind Cornell-al10ind Firmware Cornell-l29a Cornell-l29a Firmware Cornell-tl10b Cornell-tl10b Firmware Dubai-al00a Dubai-al00a Firmware Dura-al00a Dura-al00a Firmware Dura-tl00a Dura-tl00a Firmware Emily-l29c Emily-l29c Firmware Ever-l29b Ever-l29b Firmware Figo-l23 Figo-l23 Firmware Figo-l31 Figo-l31 Firmware Figo-tl10b Figo-tl10b Firmware Florida-al20b Florida-al20b Firmware Florida-l21 Florida-l21 Firmware Florida-l22 Florida-l22 Firmware Florida-l23 Florida-l23 Firmware Florida-tl10b Florida-tl10b Firmware Harry-al00c Harry-al00c Firmware Harry-al10b Harry-al10b Firmware Harry-tl00c Harry-tl00c Firmware Hima-l29c Hima-l29c Firmware Honor 10 Lite Honor 10 Lite Firmware Honor 20 Honor 20 Firmware Honor 20 Pro Honor 20 Pro Firmware Honor 8a Honor 8a Firmware Honor 8x Honor 8x Firmware Honor View 10 Honor View 10 Firmware Honor View 20 Honor View 20 Firmware Imanager Neteco Imanager Neteco 6000 Imanager Neteco 6000 Firmware Imanager Neteco Firmware Jakarta-al00a Jakarta-al00a Firmware Johnson-tl00d Johnson-tl00d Firmware Johnson-tl00f Johnson-tl00f Firmware Katyusha-al00a Katyusha-al00a Firmware Laya-al00ep Laya-al00ep Firmware Leland-l21a Leland-l21a Firmware Leland-l31a Leland-l31a Firmware Leland-l32a Leland-l32a Firmware Leland-l32c Leland-l32c Firmware Leland-l42a Leland-l42a Firmware Leland-l42c Leland-l42c Firmware Leland-tl10b Leland-tl10b Firmware Leland-tl10c Leland-tl10c Firmware Lelandp-al00c Lelandp-al00c Firmware Lelandp-al10b Lelandp-al10b Firmware Lelandp-al10d Lelandp-al10d Firmware Lelandp-l22a Lelandp-l22a Firmware Lelandp-l22c Lelandp-l22c Firmware Lelandp-l22d Lelandp-l22d Firmware London-al40ind London-al40ind Firmware Madrid-al00a Madrid-al00a Firmware Madrid-tl00a Madrid-tl00a Firmware Mate 20 Mate 20 Firmware Mate 20 Pro Mate 20 Pro Firmware Mate 20 X Mate 20 X Firmware Neo-al00d Neo-al00d Firmware Nova 3 Nova 3 Firmware Nova 4 Nova 4 Firmware Nova 5 Nova 5 Firmware Nova 5i Pro Nova 5i Pro Firmware Nova Lite 3 Nova Lite 3 Firmware P20 P20 Firmware P20 Pro P20 Pro Firmware P30 P30 Firmware P30 Pro P30 Pro Firmware P Smart P Smart 2019 P Smart 2019 Firmware P Smart Firmware Paris-al00ic Paris-al00ic Firmware Paris-l21b Paris-l21b Firmware Paris-l21meb Paris-l21meb Firmware Paris-l29b Paris-l29b Firmware Potter-al00c Potter-al00c Firmware Potter-al10a Potter-al10a Firmware Princeton-al10b Princeton-al10b Firmware Princeton-al10d Princeton-al10d Firmware Princeton-tl10c Princeton-tl10c Firmware Sydney-al00 Sydney-al00 Firmware Sydney-l21 Sydney-l21 Firmware Sydney-l21br Sydney-l21br Firmware Sydney-l22 Sydney-l22 Firmware Sydney-l22br Sydney-l22br Firmware Sydney-tl00 Sydney-tl00 Firmware Sydneym-al00 Sydneym-al00 Firmware Sydneym-l01 Sydneym-l01 Firmware Sydneym-l03 Sydneym-l03 Firmware Sydneym-l21 Sydneym-l21 Firmware Sydneym-l22 Sydneym-l22 Firmware Sydneym-l23 Sydneym-l23 Firmware Tony-al00b Tony-al00b Firmware Tony-tl00b Tony-tl00b Firmware Y5 2018 Y5 2018 Firmware Y5 Lite Y5 Lite Firmware Y6 2019 Y6 2019 Firmware Y6 Prime 2018 Y6 Prime 2018 Firmware Y6 Pro 2019 Y6 Pro 2019 Firmware Y7 2019 Y7 2019 Firmware Y9 2019 Y9 2019 Firmware Yale-al00a Yale-al00a Firmware Yale-al50a Yale-al50a Firmware Yale-l21a Yale-l21a Firmware Yale-l61c Yale-l61c Firmware Yale-tl00b Yale-tl00b Firmware Yalep-al10b Yalep-al10b Firmware
Opensuse Leap
Redhat Enterprise Linux Enterprise Linux Aus Enterprise Linux Eus Enterprise Linux For Real Time Enterprise Linux For Real Time Eus Enterprise Linux For Real Time For Nfv Enterprise Linux For Real Time For Nfv Eus Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Tus Enterprise Mrg Mrg Realtime Rhel Aus Rhel E4s Rhel Eus Rhel Extras Rt Rhel Tus Virtualization Host Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2024-09-16T19:14:13.573Z

Reserved: 2019-03-01T00:00:00.000Z

Link: CVE-2019-9506

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-08-14T17:15:11.597

Modified: 2024-11-21T04:51:45.113

Link: CVE-2019-9506

cve-icon Redhat

Severity : Important

Publid Date: 2019-08-10T09:00:00Z

Links: CVE-2019-9506 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses