Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Bluetooth
Subscribe
|
Bluetooth Core Specification
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Intel
Subscribe
|
Ac 1550
Subscribe
Ac 1550 Firmware
Subscribe
Ac 3165
Subscribe
Ac 3165 Firmware
Subscribe
Ac 3168
Subscribe
Ac 3168 Firmware
Subscribe
Ac 7265
Subscribe
Ac 7265 Firmware
Subscribe
Ac 8260
Subscribe
Ac 8260 Firmware
Subscribe
Ac 8265
Subscribe
Ac 8265 Firmware
Subscribe
Ac 9260
Subscribe
Ac 9260 Firmware
Subscribe
Ac 9461
Subscribe
Ac 9461 Firmware
Subscribe
Ac 9462
Subscribe
Ac 9462 Firmware
Subscribe
Ac 9560
Subscribe
Ac 9560 Firmware
Subscribe
Ax1650
Subscribe
Ax1650 Firmware
Subscribe
Ax1675
Subscribe
Ax1675 Firmware
Subscribe
Ax200
Subscribe
Ax200 Firmware
Subscribe
Ax201
Subscribe
Ax201 Firmware
Subscribe
Ax210
Subscribe
Ax210 Firmware
Subscribe
|
|
Linux
Subscribe
|
Linux Kernel
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2689-1 | linux security update |
Debian DLA |
DLA-2690-1 | linux-4.19 security update |
Debian DLA |
DLA-2692-1 | bluez security update |
Debian DSA |
DSA-4951-1 | bluez security update |
EUVD |
EUVD-2020-19103 | Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time. |
Ubuntu USN |
USN-4989-1 | BlueZ vulnerabilities |
Ubuntu USN |
USN-4989-2 | BlueZ vulnerabilities |
Ubuntu USN |
USN-5017-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5018-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5046-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5050-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5299-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5343-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T19:12:18.753Z
Reserved: 2020-10-04T00:00:00.000Z
Link: CVE-2020-26558
No data.
Status : Modified
Published: 2021-05-24T18:15:07.930
Modified: 2025-11-04T20:15:58.053
Link: CVE-2020-26558
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN