Vulnerability Details : CVE-2019-9506
Potential exploit
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
Products affected by CVE-2019-9506
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_aus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:virtualization_host_eus:4.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.12.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.13.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:12.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:watchos:5.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:12.4:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:o:huawei:berkeley-al20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:lelandp-l22c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:lelandp-l22d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:emily-l29c_firmware:8.1.0.156\(c605\):*:*:*:*:*:*:*
- cpe:2.3:o:huawei:mate_20_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:nova_3_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:p20_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:p30_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-l23_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-l31_firmware:8.0.0.122d\(c652\):*:*:*:*:*:*:*
- cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:florida-l23_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:p_smart_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_view_10_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-l21a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-l31a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:y9_2019_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:p30_pro_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:mate_20_x_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_10_lite_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_8a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:p20_pro_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:mate_20_pro_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:nova_5i_pro_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:nova_5_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:hima-l29c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-al10i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:harry-al00c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:harry-al10b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:harry-tl00c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:johnson-tl00d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:johnson-tl00f_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:laya-al00ep_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:neo-al00d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:potter-al00c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:potter-al10a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:princeton-al10b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:princeton-al10d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:princeton-tl10c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:tony-al00b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:tony-tl00b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_8x_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:nova_lite_3_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_view_20_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:paris-l21b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:paris-l21meb_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:paris-l29b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydney-al00_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydney-l21_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydney-l21br_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydney-l22_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydney-l22br_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydneym-al00_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydneym-l01_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydneym-l03_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydneym-l21_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydneym-l22_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydneym-l23_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:yale-l21a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:nova_4_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:lelandp-l22a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:yale-tl00b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:yalep-al10b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:yale-al00a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:imanager_neteco_6000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:imanager_neteco_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:ares-tl00c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:asoka-al00ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:atomu-l33_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:atomu-l41_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:atomu-l42_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cairogo-l22_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-al00i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-al00ind_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-al10ind_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:dubai-al00a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:dura-tl00a_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:figo-tl10b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:p_smart_2019_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:y5_2018_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:y5_lite_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:y6_2019_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:y6_prime_2018_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:y6_pro_2019_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:y7_2019_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:jakarta-al00a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:katyusha-al00a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-l32a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-l32c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-l42a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-l42c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-tl10b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:leland-tl10c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:lelandp-al00c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:lelandp-al10b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:lelandp-al10d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:london-al40ind_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:madrid-al00a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:madrid-tl00a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:paris-al00ic_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:sydney-tl00_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:yale-al50a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:huawei:yale-l61c_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Threat overview for CVE-2019-9506
Top countries where our scanners detected CVE-2019-9506
Top open port discovered on systems with this issue
53
IPs affected by CVE-2019-9506 62,478
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2019-9506!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2019-9506
2.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-9506
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.8
|
MEDIUM | AV:A/AC:L/Au:N/C:P/I:P/A:N |
6.5
|
4.9
|
NIST | |
7.6
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
2.8
|
4.7
|
CERT/CC | |
8.1
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
2.8
|
5.2
|
NIST |
CWE ids for CVE-2019-9506
-
Assigned by: cret@cert.org (Secondary)
-
The product uses a broken or risky cryptographic algorithm or protocol.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-9506
-
http://www.cs.ox.ac.uk/publications/publication12404-abstract.html
Department of Computer Science, University of Oxford: Publication - The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDRThird Party Advisory
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en
Security Advisory - Key Negotiation of Bluetooth (KNOB) VulnerabilityThird Party Advisory
-
https://www.kb.cert.org/vuls/id/918987/
VU#918987 - Bluetooth BR/EDR supported devices are vulnerable to key negotiation attacksThird Party Advisory;US Government Resource
-
https://usn.ubuntu.com/4118-1/
USN-4118-1: Linux kernel (AWS) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:2975
RHSA-2019:2975 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3517
RHSA-2019:3517 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | USENIXThird Party Advisory
-
http://seclists.org/fulldisclosure/2019/Aug/15
Full Disclosure: APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4Mailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3165
RHSA-2019:3165 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3218
RHSA-2019:3218 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://seclists.org/fulldisclosure/2019/Aug/13
Full Disclosure: APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4Mailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3231
RHSA-2019:3231 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
[SECURITY] [DLA 1919-1] linux-4.9 security updateMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3187
RHSA-2019:3187 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
[SECURITY] [DLA 1919-2] linux-4.9 security updateMailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2019/Aug/11
Full Disclosure: APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 SierraMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3220
RHSA-2019:3220 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
[security-announce] openSUSE-SU-2019:2307-1: important: Security updateMailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2019/Aug/14
Full Disclosure: APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3Mailing List;Third Party Advisory
-
https://usn.ubuntu.com/4115-1/
USN-4115-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3055
RHSA-2019:3055 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3217
RHSA-2019:3217 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/
Security Notice | Bluetooth Technology WebsiteThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3089
RHSA-2019:3089 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/4147-1/
USN-4147-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
[security-announce] openSUSE-SU-2019:2308-1: important: Security updateMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3309
RHSA-2019:3309 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:3076
RHSA-2019:3076 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
[SECURITY] [DLA 1930-1] linux security updateMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2020:0204
RHSA-2020:0204 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to