The Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64 generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits during BLE pairing. This is the case for both authenticated and unauthenticated pairing with both LE Secure Connections as well as LE Legacy Pairing. A predictable or brute-forceable random number allows an attacker (in radio range) to perform a MITM attack during BLE pairing.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-4294 The Bluetooth Low Energy implementation in Cypress PSoC Creator BLE 4.2 component versions before 3.64 generates a random number (Pairing Random) with significantly less entropy than the specified 128 bits during BLE pairing. This is the case for both authenticated and unauthenticated pairing with both LE Secure Connections as well as LE Legacy Pairing. A predictable or brute-forceable random number allows an attacker (in radio range) to perform a MITM attack during BLE pairing.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T11:42:00.828Z

Reserved: 2020-04-20T00:00:00

Link: CVE-2020-11957

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-09T19:15:10.120

Modified: 2024-11-21T04:58:59.200

Link: CVE-2020-11957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.