Overview
A collection of Bluetooth implementation vulnerabilities known as "BlueBorne" has been released. These vulnerabilities collectively affect Windows, iOS, and Linux-kernel-based operating systems including Android and Tizen, and may in worst case allow an unauthenticated attacker to perform commands on the device.
Description
The following vulnerabilities have been identified in various Bluetooth implementations: 1. CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') - CVE-2017-1000251 |
Impact
An unauthenticated, remote attacker may be able to obtain private information about the device or user, or execute arbitrary code on the device. |
Solution
Apply an update |
Disable Bluetooth on your device |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.9 | AV:A/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 6.2 | E:POC/RL:OF/RC:C |
Environmental | 6.2 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://www.armis.com/blueborne/#/technical
- https://source.android.com/security/bulletin/2017-09-01
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8628
- http://cwe.mitre.org/data/definitions/120.html
- http://cwe.mitre.org/data/definitions/122.html
- http://cwe.mitre.org/data/definitions/125.html
- http://cwe.mitre.org/data/definitions/191.html
- http://cwe.mitre.org/data/definitions/300.html
Acknowledgements
These vulnerabilities were publicly disclosed by Ben Seri and Gregory Vishnepolsky of Armis. Armis acknowledges Alon Livne for the Linux RCE (CVE-2017-1000251) exploit.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, CVE-2017-0785, CVE-2017-8628, CVE-2017-14315, CVE-2017-1000250, CVE-2017-1000251 |
Date Public: | 2017-09-12 |
Date First Published: | 2017-09-12 |
Date Last Updated: | 2017-11-08 20:46 UTC |
Document Revision: | 56 |