Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

Project Subscriptions

Vendors Products
Bluetooth Subscribe
Bluetooth Core Specification Subscribe
Debian Linux Subscribe
Fedoraproject Subscribe
Ac 1550 Subscribe
Ac 1550 Firmware Subscribe
Ac 3165 Subscribe
Ac 3165 Firmware Subscribe
Ac 3168 Subscribe
Ac 3168 Firmware Subscribe
Ac 7265 Subscribe
Ac 7265 Firmware Subscribe
Ac 8260 Subscribe
Ac 8260 Firmware Subscribe
Ac 8265 Subscribe
Ac 8265 Firmware Subscribe
Ac 9260 Subscribe
Ac 9260 Firmware Subscribe
Ac 9461 Subscribe
Ac 9461 Firmware Subscribe
Ac 9462 Subscribe
Ac 9462 Firmware Subscribe
Ac 9560 Subscribe
Ac 9560 Firmware Subscribe
Ax1650 Firmware Subscribe
Ax1675 Firmware Subscribe
Ax200 Firmware Subscribe
Ax201 Firmware Subscribe
Ax210 Firmware Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2689-1 linux security update
Debian DLA Debian DLA DLA-2690-1 linux-4.19 security update
Debian DLA Debian DLA DLA-2692-1 bluez security update
Debian DSA Debian DSA DSA-4951-1 bluez security update
EUVD EUVD EUVD-2020-19103 Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
Ubuntu USN Ubuntu USN USN-4989-1 BlueZ vulnerabilities
Ubuntu USN Ubuntu USN USN-4989-2 BlueZ vulnerabilities
Ubuntu USN Ubuntu USN USN-5017-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5018-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5046-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5050-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5299-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5343-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-04T19:12:18.753Z

Reserved: 2020-10-04T00:00:00.000Z

Link: CVE-2020-26558

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-24T18:15:07.930

Modified: 2025-11-04T20:15:58.053

Link: CVE-2020-26558

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-05-24T16:00:00Z

Links: CVE-2020-26558 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses