A high-severity Bluetooth vulnerability has been uncovered, which could enable an unauthenticated attacker within wireless range to eavesdrop or alter communications between paired devices.

The flaw (CVE-2020-15802), discovered independently by researchers at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University, is being referred to as “BLURtooth.” The issue exists in the pairing process for Bluetooth 4.0 through 5.0 implementations. This pairing process is called Cross-Transport Key Derivation (CTKD).

“Devices… using [CTKD] for pairing are vulnerable to key overwrite, which enables an attacker to gain additional access to profiles or services that are not restricted, by reducing the encryption key strength or overwriting an authenticated key with an unauthenticated key,” according to a security advisory on Wednesday by the Carnegie Mellon CERT Coordination Center.

#vulnerabilities #web security #authentication keys #bluetooth #bluetooth 4.0 #bluetooth 5.0 #bluetooth classic #bluetooth low energy #blurtooth #cross-transport key derivation #cve-2020-15802 #man-in-the-middle attacks #mitm

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks
1.50 GEEK