Search criteria

4 vulnerabilities found for lelandp-l22a_firmware by huawei

CVE-2020-9069 (GCVE-0-2020-9069)

Vulnerability from nvd – Published: 2020-05-21 14:19 – Updated: 2024-08-04 10:19
VLAI?
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8
Severity ?
No CVSS data available.
CWE
  • Information Leakage
Assigner
References
Impacted products
Vendor Product Version
HUAWEI Anne-AL00 Affected: earlier than 9.1.0.331(C675E9R1P3T8)
Create a notification for this product.
    HUAWEI Berkeley-L09 Affected: earlier than 10.0.1.1(C675R1)
Create a notification for this product.
    HUAWEI CD16-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD17-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD17-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD18-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD18-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI Columbia-TL00B Affected: earlier than 9.0.0.187(C01E181R1P20T8)
Create a notification for this product.
    HUAWEI E6878-370 Affected: earlier than 10.0.5.1(H610SP10C00)
Create a notification for this product.
    HUAWEI HUAWEI P30 lite Affected: earlier than 10.0.0.185(C605E3R1P3)
Affected: earlier than 10.0.0.197(C432E8R2P7)
Create a notification for this product.
    HUAWEI HUAWEI nova 4e Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Honor 10 Lite Affected: 9.0.1.113(C675E11R1P12)
Create a notification for this product.
    HUAWEI LelandP-L22A Affected: earlier than 9.1.0.166(C675E5R1P4T8)
Create a notification for this product.
    HUAWEI Marie-AL00AX Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Marie-AL00AY Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Marie-AL00BX Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Marie-L03BX Affected: earlier than 10.0.0.188(C605E5R1P1)
Create a notification for this product.
    HUAWEI Marie-L21BX Affected: earlier than 10.0.0.188(C432E4R4P1)
Affected: earlier than 10.0.0.188(C461E5R3P1)
Create a notification for this product.
    HUAWEI Marie-L22BX Affected: earlier than 10.0.0.188(C636E3R3P1)
Create a notification for this product.
    HUAWEI Marie-L23BX Affected: earlier than 10.0.0.188(C605E5R1P1)
Create a notification for this product.
    HUAWEI TC5200-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS5200-11 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS5200-12 Affected: earlier than 10.0.2.23
Create a notification for this product.
    HUAWEI WS5200-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS5200-17 Affected: earlier than 10.0.2.23
Create a notification for this product.
    HUAWEI WS5800-10 Affected: earlier than 10.0.3.27
Create a notification for this product.
    HUAWEI WS6500-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS6500-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:19.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Anne-AL00",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.331(C675E9R1P3T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.1.1(C675R1)"
            }
          ]
        },
        {
          "product": "CD16-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "Columbia-TL00B",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.187(C01E181R1P20T8)"
            }
          ]
        },
        {
          "product": "E6878-370",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.5.1(H610SP10C00)"
            }
          ]
        },
        {
          "product": "HUAWEI P30 lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.185(C605E3R1P3)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.197(C432E8R2P7)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 4e",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "9.0.1.113(C675E11R1P12)"
            }
          ]
        },
        {
          "product": "LelandP-L22A",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.166(C675E5R1P4T8)"
            }
          ]
        },
        {
          "product": "Marie-AL00AX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00AY",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-L03BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "Marie-L21BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C432E4R4P1)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C461E5R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L22BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C636E3R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L23BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "TC5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-11",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-12",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-17",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5800-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.3.27"
            }
          ]
        },
        {
          "product": "WS6500-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS6500-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Leakage",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-29T22:23:46",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9069",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.331(C675E9R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.1.1(C675R1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD16-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-TL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.187(C01E181R1P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "E6878-370",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.5.1(H610SP10C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.185(C605E3R1P3)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.197(C432E8R2P7)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 4e",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "9.0.1.113(C675E11R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "LelandP-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.166(C675E5R1P4T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AY",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L03BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L21BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C432E4R4P1)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.188(C461E5R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L22BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C636E3R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L23BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TC5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-12",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-17",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5800-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.3.27"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "HUAWEI"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Leakage"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9069",
    "datePublished": "2020-05-21T14:19:31",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:19.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-9506 (GCVE-0-2019-9506)

Vulnerability from nvd – Published: 2019-08-14 16:27 – Updated: 2024-09-16 19:14
VLAI?
Title
Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation
Summary
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
CWE
Assigner
References
https://www.kb.cert.org/vuls/id/918987/ third-party-advisoryx_refsource_CERT-VN
http://www.cs.ox.ac.uk/publications/publication12… x_refsource_MISC
https://www.usenix.org/conference/usenixsecurity1… x_refsource_MISC
https://www.bluetooth.com/security/statement-key-… x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2019/Aug/14 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/11 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/13 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/15 mailing-listx_refsource_FULLDISC
http://www.huawei.com/en/psirt/security-advisorie… x_refsource_CONFIRM
https://usn.ubuntu.com/4115-1/ vendor-advisoryx_refsource_UBUNTU
https://usn.ubuntu.com/4118-1/ vendor-advisoryx_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://usn.ubuntu.com/4147-1/ vendor-advisoryx_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:2975 vendor-advisoryx_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://access.redhat.com/errata/RHSA-2019:3076 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3055 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3089 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3187 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3165 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3217 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3220 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3231 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3218 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3309 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3517 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0204 vendor-advisoryx_refsource_REDHAT
Impacted products
Vendor Product Version
Bluetooth BR/EDR Affected: 5.1 , ≤ 5.1 (custom)
Create a notification for this product.
Credits
Daniele Antonioli‚ Nils Ole Tippenhauer, Kasper Rasmussen
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:54:44.303Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#918987",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/918987/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
          },
          {
            "name": "USN-4115-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4115-1/"
          },
          {
            "name": "USN-4118-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4118-1/"
          },
          {
            "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
          },
          {
            "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
          },
          {
            "name": "USN-4147-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4147-1/"
          },
          {
            "name": "RHSA-2019:2975",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:2975"
          },
          {
            "name": "openSUSE-SU-2019:2307",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
          },
          {
            "name": "openSUSE-SU-2019:2308",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
          },
          {
            "name": "RHSA-2019:3076",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3076"
          },
          {
            "name": "RHSA-2019:3055",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3055"
          },
          {
            "name": "RHSA-2019:3089",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3089"
          },
          {
            "name": "RHSA-2019:3187",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3187"
          },
          {
            "name": "RHSA-2019:3165",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3165"
          },
          {
            "name": "RHSA-2019:3217",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3217"
          },
          {
            "name": "RHSA-2019:3220",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3220"
          },
          {
            "name": "RHSA-2019:3231",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3231"
          },
          {
            "name": "RHSA-2019:3218",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3218"
          },
          {
            "name": "RHSA-2019:3309",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3309"
          },
          {
            "name": "RHSA-2019:3517",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3517"
          },
          {
            "name": "RHSA-2020:0204",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0204"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "N/A"
          ],
          "product": "BR/EDR",
          "vendor": "Bluetooth",
          "versions": [
            {
              "lessThanOrEqual": "5.1",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
        }
      ],
      "datePublic": "2019-08-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-310",
              "description": "CWE-310 Cryptographic Issues",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-30T10:06:23",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#918987",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/918987/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
        },
        {
          "name": "USN-4115-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4115-1/"
        },
        {
          "name": "USN-4118-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4118-1/"
        },
        {
          "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
        },
        {
          "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
        },
        {
          "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
        },
        {
          "name": "USN-4147-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4147-1/"
        },
        {
          "name": "RHSA-2019:2975",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:2975"
        },
        {
          "name": "openSUSE-SU-2019:2307",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
        },
        {
          "name": "openSUSE-SU-2019:2308",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
        },
        {
          "name": "RHSA-2019:3076",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3076"
        },
        {
          "name": "RHSA-2019:3055",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3055"
        },
        {
          "name": "RHSA-2019:3089",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3089"
        },
        {
          "name": "RHSA-2019:3187",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3187"
        },
        {
          "name": "RHSA-2019:3165",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3165"
        },
        {
          "name": "RHSA-2019:3217",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3217"
        },
        {
          "name": "RHSA-2019:3220",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3220"
        },
        {
          "name": "RHSA-2019:3231",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3231"
        },
        {
          "name": "RHSA-2019:3218",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3218"
        },
        {
          "name": "RHSA-2019:3309",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "name": "RHSA-2019:3517",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3517"
        },
        {
          "name": "RHSA-2020:0204",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2020:0204"
        }
      ],
      "source": {
        "advisory": "VU#918987",
        "defect": [
          "VU#918987"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation",
      "workarounds": [
        {
          "lang": "en",
          "value": "Bluetooth SIG Expedited Errata Correction 11838"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.7"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "KNOB",
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2019-08-14",
          "ID": "CVE-2019-9506",
          "STATE": "PUBLIC",
          "TITLE": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BR/EDR",
                      "version": {
                        "version_data": [
                          {
                            "platform": "N/A",
                            "version_affected": "\u003c=",
                            "version_name": "5.1",
                            "version_value": "5.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bluetooth"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.7"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-310 Cryptographic Issues"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#918987",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/918987/"
            },
            {
              "name": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
              "refsource": "MISC",
              "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
            },
            {
              "name": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
              "refsource": "MISC",
              "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
            },
            {
              "name": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
              "refsource": "CONFIRM",
              "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
            },
            {
              "name": "USN-4115-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4115-1/"
            },
            {
              "name": "USN-4118-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4118-1/"
            },
            {
              "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
            },
            {
              "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
            },
            {
              "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
            },
            {
              "name": "USN-4147-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4147-1/"
            },
            {
              "name": "RHSA-2019:2975",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:2975"
            },
            {
              "name": "openSUSE-SU-2019:2307",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
            },
            {
              "name": "openSUSE-SU-2019:2308",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
            },
            {
              "name": "RHSA-2019:3076",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3076"
            },
            {
              "name": "RHSA-2019:3055",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3055"
            },
            {
              "name": "RHSA-2019:3089",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3089"
            },
            {
              "name": "RHSA-2019:3187",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3187"
            },
            {
              "name": "RHSA-2019:3165",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3165"
            },
            {
              "name": "RHSA-2019:3217",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3217"
            },
            {
              "name": "RHSA-2019:3220",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3220"
            },
            {
              "name": "RHSA-2019:3231",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3231"
            },
            {
              "name": "RHSA-2019:3218",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3218"
            },
            {
              "name": "RHSA-2019:3309",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3309"
            },
            {
              "name": "RHSA-2019:3517",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3517"
            },
            {
              "name": "RHSA-2020:0204",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2020:0204"
            }
          ]
        },
        "source": {
          "advisory": "VU#918987",
          "defect": [
            "VU#918987"
          ],
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Bluetooth SIG Expedited Errata Correction 11838"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2019-9506",
    "datePublished": "2019-08-14T16:27:45.059869Z",
    "dateReserved": "2019-03-01T00:00:00",
    "dateUpdated": "2024-09-16T19:14:13.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-9069 (GCVE-0-2020-9069)

Vulnerability from cvelistv5 – Published: 2020-05-21 14:19 – Updated: 2024-08-04 10:19
VLAI?
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8
Severity ?
No CVSS data available.
CWE
  • Information Leakage
Assigner
References
Impacted products
Vendor Product Version
HUAWEI Anne-AL00 Affected: earlier than 9.1.0.331(C675E9R1P3T8)
Create a notification for this product.
    HUAWEI Berkeley-L09 Affected: earlier than 10.0.1.1(C675R1)
Create a notification for this product.
    HUAWEI CD16-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD17-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD17-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD18-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI CD18-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI Columbia-TL00B Affected: earlier than 9.0.0.187(C01E181R1P20T8)
Create a notification for this product.
    HUAWEI E6878-370 Affected: earlier than 10.0.5.1(H610SP10C00)
Create a notification for this product.
    HUAWEI HUAWEI P30 lite Affected: earlier than 10.0.0.185(C605E3R1P3)
Affected: earlier than 10.0.0.197(C432E8R2P7)
Create a notification for this product.
    HUAWEI HUAWEI nova 4e Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Honor 10 Lite Affected: 9.0.1.113(C675E11R1P12)
Create a notification for this product.
    HUAWEI LelandP-L22A Affected: earlier than 9.1.0.166(C675E5R1P4T8)
Create a notification for this product.
    HUAWEI Marie-AL00AX Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Marie-AL00AY Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Marie-AL00BX Affected: earlier than 10.0.0.158(C00E64R1P9)
Create a notification for this product.
    HUAWEI Marie-L03BX Affected: earlier than 10.0.0.188(C605E5R1P1)
Create a notification for this product.
    HUAWEI Marie-L21BX Affected: earlier than 10.0.0.188(C432E4R4P1)
Affected: earlier than 10.0.0.188(C461E5R3P1)
Create a notification for this product.
    HUAWEI Marie-L22BX Affected: earlier than 10.0.0.188(C636E3R3P1)
Create a notification for this product.
    HUAWEI Marie-L23BX Affected: earlier than 10.0.0.188(C605E5R1P1)
Create a notification for this product.
    HUAWEI TC5200-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS5200-11 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS5200-12 Affected: earlier than 10.0.2.23
Create a notification for this product.
    HUAWEI WS5200-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS5200-17 Affected: earlier than 10.0.2.23
Create a notification for this product.
    HUAWEI WS5800-10 Affected: earlier than 10.0.3.27
Create a notification for this product.
    HUAWEI WS6500-10 Affected: earlier than 10.0.2.8
Create a notification for this product.
    HUAWEI WS6500-16 Affected: earlier than 10.0.2.8
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:19:19.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Anne-AL00",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.331(C675E9R1P3T8)"
            }
          ]
        },
        {
          "product": "Berkeley-L09",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.1.1(C675R1)"
            }
          ]
        },
        {
          "product": "CD16-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD17-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "CD18-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "Columbia-TL00B",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.0.0.187(C01E181R1P20T8)"
            }
          ]
        },
        {
          "product": "E6878-370",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.5.1(H610SP10C00)"
            }
          ]
        },
        {
          "product": "HUAWEI P30 lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.185(C605E3R1P3)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.197(C432E8R2P7)"
            }
          ]
        },
        {
          "product": "HUAWEI nova 4e",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Honor 10 Lite",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "9.0.1.113(C675E11R1P12)"
            }
          ]
        },
        {
          "product": "LelandP-L22A",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 9.1.0.166(C675E5R1P4T8)"
            }
          ]
        },
        {
          "product": "Marie-AL00AX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00AY",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-AL00BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.158(C00E64R1P9)"
            }
          ]
        },
        {
          "product": "Marie-L03BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "Marie-L21BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C432E4R4P1)"
            },
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C461E5R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L22BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C636E3R3P1)"
            }
          ]
        },
        {
          "product": "Marie-L23BX",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.0.188(C605E5R1P1)"
            }
          ]
        },
        {
          "product": "TC5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-11",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-12",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5200-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS5200-17",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.23"
            }
          ]
        },
        {
          "product": "WS5800-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.3.27"
            }
          ]
        },
        {
          "product": "WS6500-10",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        },
        {
          "product": "WS6500-16",
          "vendor": "HUAWEI",
          "versions": [
            {
              "status": "affected",
              "version": "earlier than 10.0.2.8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Leakage",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-29T22:23:46",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2020-9069",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Anne-AL00",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.331(C675E9R1P3T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Berkeley-L09",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.1.1(C675R1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD16-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD17-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CD18-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Columbia-TL00B",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.0.0.187(C01E181R1P20T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "E6878-370",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.5.1(H610SP10C00)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI P30 lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.185(C605E3R1P3)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.197(C432E8R2P7)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "HUAWEI nova 4e",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor 10 Lite",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "9.0.1.113(C675E11R1P12)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "LelandP-L22A",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 9.1.0.166(C675E5R1P4T8)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00AY",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-AL00BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.158(C00E64R1P9)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L03BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L21BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C432E4R4P1)"
                          },
                          {
                            "version_value": "earlier than 10.0.0.188(C461E5R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L22BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C636E3R3P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Marie-L23BX",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.0.188(C605E5R1P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "TC5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-11",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-12",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5200-17",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.23"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS5800-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.3.27"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-10",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "WS6500-16",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "earlier than 10.0.2.8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "HUAWEI"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Leakage"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2020-9069",
    "datePublished": "2020-05-21T14:19:31",
    "dateReserved": "2020-02-18T00:00:00",
    "dateUpdated": "2024-08-04T10:19:19.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-9506 (GCVE-0-2019-9506)

Vulnerability from cvelistv5 – Published: 2019-08-14 16:27 – Updated: 2024-09-16 19:14
VLAI?
Title
Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation
Summary
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
CWE
Assigner
References
https://www.kb.cert.org/vuls/id/918987/ third-party-advisoryx_refsource_CERT-VN
http://www.cs.ox.ac.uk/publications/publication12… x_refsource_MISC
https://www.usenix.org/conference/usenixsecurity1… x_refsource_MISC
https://www.bluetooth.com/security/statement-key-… x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2019/Aug/14 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/11 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/13 mailing-listx_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/15 mailing-listx_refsource_FULLDISC
http://www.huawei.com/en/psirt/security-advisorie… x_refsource_CONFIRM
https://usn.ubuntu.com/4115-1/ vendor-advisoryx_refsource_UBUNTU
https://usn.ubuntu.com/4118-1/ vendor-advisoryx_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019… mailing-listx_refsource_MLIST
https://usn.ubuntu.com/4147-1/ vendor-advisoryx_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:2975 vendor-advisoryx_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://access.redhat.com/errata/RHSA-2019:3076 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3055 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3089 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3187 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3165 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3217 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3220 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3231 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3218 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3309 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3517 vendor-advisoryx_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0204 vendor-advisoryx_refsource_REDHAT
Impacted products
Vendor Product Version
Bluetooth BR/EDR Affected: 5.1 , ≤ 5.1 (custom)
Create a notification for this product.
Credits
Daniele Antonioli‚ Nils Ole Tippenhauer, Kasper Rasmussen
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:54:44.303Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#918987",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/918987/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
          },
          {
            "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
          },
          {
            "name": "USN-4115-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4115-1/"
          },
          {
            "name": "USN-4118-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4118-1/"
          },
          {
            "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
          },
          {
            "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
          },
          {
            "name": "USN-4147-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4147-1/"
          },
          {
            "name": "RHSA-2019:2975",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:2975"
          },
          {
            "name": "openSUSE-SU-2019:2307",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
          },
          {
            "name": "openSUSE-SU-2019:2308",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
          },
          {
            "name": "RHSA-2019:3076",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3076"
          },
          {
            "name": "RHSA-2019:3055",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3055"
          },
          {
            "name": "RHSA-2019:3089",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3089"
          },
          {
            "name": "RHSA-2019:3187",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3187"
          },
          {
            "name": "RHSA-2019:3165",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3165"
          },
          {
            "name": "RHSA-2019:3217",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3217"
          },
          {
            "name": "RHSA-2019:3220",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3220"
          },
          {
            "name": "RHSA-2019:3231",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3231"
          },
          {
            "name": "RHSA-2019:3218",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3218"
          },
          {
            "name": "RHSA-2019:3309",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3309"
          },
          {
            "name": "RHSA-2019:3517",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2019:3517"
          },
          {
            "name": "RHSA-2020:0204",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2020:0204"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "N/A"
          ],
          "product": "BR/EDR",
          "vendor": "Bluetooth",
          "versions": [
            {
              "lessThanOrEqual": "5.1",
              "status": "affected",
              "version": "5.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
        }
      ],
      "datePublic": "2019-08-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-310",
              "description": "CWE-310 Cryptographic Issues",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-30T10:06:23",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#918987",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/918987/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
        },
        {
          "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
        },
        {
          "name": "USN-4115-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4115-1/"
        },
        {
          "name": "USN-4118-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4118-1/"
        },
        {
          "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
        },
        {
          "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
        },
        {
          "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
        },
        {
          "name": "USN-4147-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4147-1/"
        },
        {
          "name": "RHSA-2019:2975",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:2975"
        },
        {
          "name": "openSUSE-SU-2019:2307",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
        },
        {
          "name": "openSUSE-SU-2019:2308",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
        },
        {
          "name": "RHSA-2019:3076",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3076"
        },
        {
          "name": "RHSA-2019:3055",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3055"
        },
        {
          "name": "RHSA-2019:3089",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3089"
        },
        {
          "name": "RHSA-2019:3187",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3187"
        },
        {
          "name": "RHSA-2019:3165",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3165"
        },
        {
          "name": "RHSA-2019:3217",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3217"
        },
        {
          "name": "RHSA-2019:3220",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3220"
        },
        {
          "name": "RHSA-2019:3231",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3231"
        },
        {
          "name": "RHSA-2019:3218",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3218"
        },
        {
          "name": "RHSA-2019:3309",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3309"
        },
        {
          "name": "RHSA-2019:3517",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2019:3517"
        },
        {
          "name": "RHSA-2020:0204",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2020:0204"
        }
      ],
      "source": {
        "advisory": "VU#918987",
        "defect": [
          "VU#918987"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation",
      "workarounds": [
        {
          "lang": "en",
          "value": "Bluetooth SIG Expedited Errata Correction 11838"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.7"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "KNOB",
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2019-08-14",
          "ID": "CVE-2019-9506",
          "STATE": "PUBLIC",
          "TITLE": "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BR/EDR",
                      "version": {
                        "version_data": [
                          {
                            "platform": "N/A",
                            "version_affected": "\u003c=",
                            "version_name": "5.1",
                            "version_value": "5.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bluetooth"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Daniele Antonioli\u201a Nils Ole Tippenhauer, Kasper Rasmussen"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.7"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-310 Cryptographic Issues"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#918987",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/918987/"
            },
            {
              "name": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
              "refsource": "MISC",
              "url": "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html"
            },
            {
              "name": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
              "refsource": "MISC",
              "url": "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli"
            },
            {
              "name": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
              "refsource": "CONFIRM",
              "url": "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
            },
            {
              "name": "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en"
            },
            {
              "name": "USN-4115-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4115-1/"
            },
            {
              "name": "USN-4118-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4118-1/"
            },
            {
              "name": "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html"
            },
            {
              "name": "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html"
            },
            {
              "name": "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"
            },
            {
              "name": "USN-4147-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4147-1/"
            },
            {
              "name": "RHSA-2019:2975",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:2975"
            },
            {
              "name": "openSUSE-SU-2019:2307",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"
            },
            {
              "name": "openSUSE-SU-2019:2308",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"
            },
            {
              "name": "RHSA-2019:3076",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3076"
            },
            {
              "name": "RHSA-2019:3055",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3055"
            },
            {
              "name": "RHSA-2019:3089",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3089"
            },
            {
              "name": "RHSA-2019:3187",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3187"
            },
            {
              "name": "RHSA-2019:3165",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3165"
            },
            {
              "name": "RHSA-2019:3217",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3217"
            },
            {
              "name": "RHSA-2019:3220",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3220"
            },
            {
              "name": "RHSA-2019:3231",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3231"
            },
            {
              "name": "RHSA-2019:3218",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3218"
            },
            {
              "name": "RHSA-2019:3309",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3309"
            },
            {
              "name": "RHSA-2019:3517",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2019:3517"
            },
            {
              "name": "RHSA-2020:0204",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2020:0204"
            }
          ]
        },
        "source": {
          "advisory": "VU#918987",
          "defect": [
            "VU#918987"
          ],
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Bluetooth SIG Expedited Errata Correction 11838"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2019-9506",
    "datePublished": "2019-08-14T16:27:45.059869Z",
    "dateReserved": "2019-03-01T00:00:00",
    "dateUpdated": "2024-09-16T19:14:13.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}