{"vulnerability": "CVE-2020-15802", "sightings": [{"uuid": "e7d748d4-a86b-4a70-8ae4-253e62a97b14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/3636", "content": "\u0410 \u0442\u0443\u0442 \u0432\u043e\u0442 \u0435\u0449\u0451 \u043a\u0430\u043a\u0430\u044f-\u0442\u043e \u043f\u0440\u0435\u043a\u0440\u0430\u0441\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Bluetooth \u043f\u043e\u0434 \u043d\u043e\u043c\u0435\u0440\u043e\u043c CVE-2020-15802. \u041f\u0440\u0438\u043c\u0435\u043d\u044f\u044f \u0435\u0435, \u043d\u0430\u043f\u0430\u0434\u0430\u044e\u0449\u0438\u0435 \u043c\u043e\u0433\u0443\u0442 \u0432 \u0438\u0442\u043e\u0433\u0435 \u043f\u043e\u0434\u0441\u043e\u0435\u0434\u0438\u043d\u0438\u0442\u044c\u0441\u044f \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443 \u0436\u0435\u0440\u0442\u0432\u044b, \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u0430\u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u043a\u043b\u044e\u0447\u0438. MiTM \u0442\u043e\u0436\u0435, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440. \u0414\u0435\u0442\u0430\u043b\u0438 \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0435 \n\nhttps://www.kb.cert.org/vuls/id/589825/", "creation_timestamp": "2020-09-11T07:15:07.000000Z"}, {"uuid": "6f2d9b74-34ce-40ab-88c0-81b1d1d2f4b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2313", "content": "#CVE-2022\nBLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]\n\nhttps://github.com/francozappa/blur\n\n@BlueRedTeam", "creation_timestamp": "2022-08-18T14:39:17.000000Z"}, {"uuid": "ff6760ff-4b37-421b-99d2-812faf190730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "seen", "source": "https://t.me/thehackernews/836", "content": "\ud83d\udd25 BLURtooth (CVE-2020-15802)\n\nA new unpatched Bluetooth pairing vulnerability could let attackers bypass authentication and easily target vulnerable nearby devices.\n\nRead details \u2014 https://thehackernews.com/2020/09/new-bluetooth-vulnerability.html", "creation_timestamp": "2020-09-10T23:40:58.000000Z"}, {"uuid": "e731edbe-1b40-4ec8-a876-2bf06c947b48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "seen", "source": "MISP/e768a854-920a-47c6-9102-dce00684079d", "content": "", "creation_timestamp": "2024-11-14T06:07:11.000000Z"}, {"uuid": "2287183c-36ed-4144-b527-9a3d3cfa9af7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "seen", "source": "https://t.me/cKure/2162", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Bluetooth 4.0 through 5.0 versions are affected by the vulnerability dubbed BLURtooth which allows hackers to defeat Bluetooth encryption.\n\nCVE-2020-15802\n\nhttps://securityaffairs.co/wordpress/108096/hacking/blurtooth-bluetooth-attack.html", "creation_timestamp": "2020-09-10T12:14:16.000000Z"}, {"uuid": "e7b3d18f-8099-40c4-a541-8598ddf65c01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2975", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aBLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]\nURL\uff1ahttps://github.com/francozappa/blur\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-17T19:34:20.000000Z"}, {"uuid": "41618695-609f-431b-8098-4c086acef549", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "seen", "source": "https://t.me/true_secator/920", "content": "\u0414\u0432\u0435 \u0433\u0440\u0443\u043f\u043f\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0437 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u041f\u0435\u0440\u0434\u044c\u044e \u0438 \u0424\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0439 \u043f\u043e\u043b\u0438\u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0448\u043a\u043e\u043b\u044b \u0432 \u041b\u043e\u0437\u0430\u043d\u043d\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u0430\u0445 Blurtooth Classic (BR/EDR) \u0438 Bluetooth Low Energy (BLE).\n\n\u041e\u0448\u0438\u0431\u043a\u0430, \u043d\u0430\u0437\u0432\u0430\u043d\u043d\u0430\u044f BLURtooth (CVE-2020-15802), \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442\u0441\u044f \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Cross-Transport Key Derivation (CTDK), \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u044f \u043a\u043b\u044e\u0447\u0435\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0441\u043e\u043f\u0440\u044f\u0436\u0435\u043d\u0438\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0447\u0435\u0440\u0435\u0437 BR/EDR \u0438\u043b\u0438 BLE, \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0442\u044c \u0442\u0430\u043a\u0438\u0435 \u043a\u043b\u044e\u0447\u0438. \u0412 \u0438\u0442\u043e\u0433\u0435 \u0445\u0430\u043a\u0435\u0440 \u043c\u043e\u0436\u0435\u0442 \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0439 \u043a\u043b\u044e\u0447 \u0438\u043b\u0438 \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u0435\u0433\u043e \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u044c.\n\n\u0410\u0442\u0430\u043a\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0441\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Bluetooth \u0441 4.0 \u043f\u043e 5.0.\n\n\u0410 \u0447\u0442\u043e \u043d\u0430\u0441\u0447\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 BLURtooth? \u0410 \u0438\u0445 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442 \u0438 \u0442\u043e\u0447\u043d\u044b\u0439 \u0441\u0440\u043e\u043a \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u0435\u043d. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c\u0441\u044f \u043e\u0442 \u043f\u043e\u0434\u043e\u0431\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0445 \u043f\u043e Bluetooth \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u041a\u0441\u0442\u0430\u0442\u0438, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043c\u043e\u0437\u0433\u043e\u0432\u044b\u0435 \u0447\u0438\u043f\u044b Neuralink \u043e\u0442 \u0418\u043b\u043e\u043d\u0430 \u041c\u0430\u0441\u043a\u0430 \u0441\u043e\u0435\u0434\u0438\u043d\u044f\u044e\u0442\u0441\u044f \u0441 \u0432\u043d\u0435\u0448\u043d\u0438\u043c\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c\u0438 \u043a\u0430\u043a \u0440\u0430\u0437 \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0443 BLE. \u0410 \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u044c\u0442\u0435, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u043b\u0438\u0441\u044c \u043a \u0432\u0436\u0438\u0432\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432 \u0433\u043e\u043b\u043e\u0432\u0443 \u0447\u0438\u043f\u0443 - \u041a\u0438\u0431\u0435\u0440\u043f\u0430\u043d\u043a 2077, \u043d\u0435 \u0438\u043d\u0430\u0447\u0435.", "creation_timestamp": "2020-09-10T10:23:38.000000Z"}, {"uuid": "4eeda44a-3ac2-473b-b462-e6a4fb4e8c76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1818", "content": "#Research\n\"BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy\" (CVE-2020-15802).\n]-&gt; Technical Details:\nhttps://hexhive.epfl.ch/BLURtooth", "creation_timestamp": "2020-12-21T03:38:07.000000Z"}, {"uuid": "e7830321-305d-4ecd-bfa1-18545e6018ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-15802", "type": "published-proof-of-concept", "source": "https://t.me/ZeroDay_TM/579", "content": "CVE-2022\n\nBLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]\n\nhttps://github.com/francozappa/blur\n\n- - - - - - - - - - - - - - - - - - - -\n-=[ @Old_Unclee ]=-\n-=[ @ZeroDay_TM ]=-", "creation_timestamp": "2022-08-20T15:38:51.000000Z"}, {"uuid": "7dfd5004-55f7-48c6-b7b4-f2166a2a8cce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2020-15802", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}]}