Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:nordicsemi:android_ble_library:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CF88981-3B19-4F70-98E1-F893528B3E54", "versionEndIncluding": "2.2.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:nordicsemi:dfu_library:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8B723DD-D227-4AD8-BD3B-922F1CA177FD", "versionEndIncluding": "1.10.4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Nordic Semiconductor Android BLE Library through 2.2.1 and DFU Library through 1.10.4 for Android (as used by nRF Connect and other applications) can engage in unencrypted communication while showing the user that the communication is purportedly encrypted. The problem is in bond creation (e.g., internalCreateBond in BleManagerHandler)."}, {"lang": "es", "value": "Nordic Semiconductor Android BLE Library versiones hasta 2.2.1 y DFU Library versiones hasta 1.10.4 para Android (tal como es usado nRF Connect y otras aplicaciones) puede participar en una comunicaci\u00f3n no cifrada mientras le muestra al usuario que la comunicaci\u00f3n est\u00e1 supuestamente cifrada. El problema est\u00e1 en la creaci\u00f3n de enlaces (por ejemplo, internalCreateBond en BleManagerHandler)"}], "id": "CVE-2020-15509", "lastModified": "2024-11-21T05:05:39.973", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-07-07T14:15:11.380", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/NordicSemiconductor/Android-BLE-Library/commits/master"}, {"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/NordicSemiconductor/Android-DFU-Library/commits/release"}, {"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory"], "url": "https://secretdiary.ninja/index.php/2020/07/03/norec-attack-stripping-ble-encryption-from-nordicsemis-android-library-cve-2020-15509/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/NordicSemiconductor/Android-BLE-Library/commits/master"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/NordicSemiconductor/Android-DFU-Library/commits/release"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://secretdiary.ninja/index.php/2020/07/03/norec-attack-stripping-ble-encryption-from-nordicsemis-android-library-cve-2020-15509/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-319"}], "source": "nvd@nist.gov", "type": "Primary"}]}