Vulnerability Details : CVE-2018-5383
Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.
Products affected by CVE-2018-5383
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-5383
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-5383
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:A/AC:M/Au:N/C:P/I:P/A:N |
5.5
|
4.9
|
NIST | |
8.0
|
HIGH | CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N |
1.6
|
5.8
|
CERT/CC | |
6.8
|
MEDIUM | CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
1.6
|
5.2
|
NIST |
CWE ids for CVE-2018-5383
-
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.Assigned by: cret@cert.org (Secondary)
-
The product does not verify, or incorrectly verifies, the cryptographic signature for data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-5383
-
https://www.kb.cert.org/vuls/id/304725
VU#304725 - Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchangeThird Party Advisory;US Government Resource
-
http://www.cs.technion.ac.il/~biham/BT/
Breaking the Bluetooth Pairing – Fixed Coordinate Invalid Curve AttackMitigation;Third Party Advisory
-
https://usn.ubuntu.com/4094-1/
USN-4094-1: Linux kernel vulnerabilities | Ubuntu security notices
-
https://usn.ubuntu.com/4118-1/
USN-4118-1: Linux kernel (AWS) vulnerabilities | Ubuntu security notices
-
http://www.securityfocus.com/bid/104879
Multiple Bluetooth Drivers CVE-2018-5383 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1041432
Google Android Multiple Flaws Let Remote Users Execute Arbitrary Code and Let Applications Gain Elevated Privileges and Obtain Potentially Sensitive Information - SecurityTrackerThird Party Advisory;VDB Entry
-
https://lists.debian.org/debian-lts-announce/2019/04/msg00005.html
[SECURITY] [DLA 1747-1] firmware-nonfree security update
-
https://usn.ubuntu.com/4351-1/
USN-4351-1: Linux firmware vulnerability | Ubuntu security notices | Ubuntu
-
https://usn.ubuntu.com/4095-1/
USN-4095-1: Linux kernel vulnerabilities | Ubuntu security notices
-
https://access.redhat.com/errata/RHSA-2019:2169
RHSA-2019:2169 - Security Advisory - Red Hat Customer Portal
-
https://www.bluetooth.com/news/unknown/2018/07/bluetooth-sig-security-update
Vendor Advisory
-
https://usn.ubuntu.com/4095-2/
USN-4095-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices
Jump to