CVE-2021-3658
Published: 28 July 2021
bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers.
Notes
Author | Note |
---|---|
mdeslaur | probably introduced by this commit: https://github.com/bluez/bluez/commit/d04eb02f9bad8795297210ef80e262be16ea8f07 so bionic and older aren't vulnerable |
Priority
Status
Package | Release | Status |
---|---|---|
bluez Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not present)
|
focal |
Released
(5.53-0ubuntu3.4)
|
|
hirsute |
Released
(5.56-0ubuntu4.3)
|
|
impish |
Released
(5.60-0ubuntu2.1)
|
|
jammy |
Not vulnerable
(5.62-0ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(5.61-1)
|
|
xenial |
Not vulnerable
(code not present)
|
|
Patches: upstream: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=b497b5942a8beb8f89ca1c359c54ad67ec843055 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Adjacent |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |