CVE-2022-24695
Publication date 2 June 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Bluetooth Classic in Bluetooth Core Specification through 5.3 does not properly conceal device information for Bluetooth transceivers in Non-Discoverable mode. By conducting an efficient over-the-air attack, an attacker can fully extract the permanent, unique Bluetooth MAC identifier, along with device capabilities and identifiers, some of which may contain identifying information about the device owner. This additionally allows the attacker to establish a connection to the target device.
Status
Package | Ubuntu Release | Status |
---|---|---|
bluez | 24.04 LTS noble | Ignored |
22.04 LTS jammy | Ignored | |
20.04 LTS focal | Ignored | |
18.04 LTS bionic | Ignored | |
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Ignored end of standard support |
Notes
alexmurray
Since this vulnerability affects the Bluetooth Core Specification it may then also affect bluez on Ubuntu. At this stage there is little detail publicly available about this vulnerability though and no patch available either.
mdeslaur
as of 2024-06-03, no software mitigation is available for this issue, marking as ignored
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.3 · Medium |
Attack vector | Adjacent |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |