Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
5.3.0-18.195.3.0-24.265.4.0-18.225.4.0-21.255.4.0-24.285.4.0-25.295.4.0-26.305.4.0-28.325.4.0-29.335.4.0-31.35+13 more5.4.0-56.626.5.0-9.94.13.0-16.194.13.0-17.204.13.0-25.294.13.0-32.354.15.0-10.114.15.0-101.1024.15.0-106.1074.15.0-108.1094.15.0-109.1104.15.0-111.112+53 more4.15.0-129.1323.11.0-12.193.12.0-1.33.12.0-2.53.12.0-2.73.12.0-3.83.12.0-3.93.12.0-4.103.12.0-4.123.12.0-5.133.12.0-7.15+170 more4.2.0-16.194.2.0-17.214.2.0-19.234.3.0-1.104.3.0-2.114.3.0-5.164.3.0-6.174.3.0-7.184.4.0-10.254.4.0-101.124+108 more4.4.0-197.2296.11.0-8.85.13.0-19.194.15.0-1001.14.15.0-1003.34.15.0-1005.54.15.0-1006.64.15.0-1007.74.15.0-1009.94.15.0-1010.104.15.0-1011.114.15.0-1016.164.15.0-1017.17+44 more4.15.0-1091.964.4.0-1001.104.4.0-1003.124.4.0-1004.134.4.0-1007.164.4.0-1009.184.4.0-1011.204.4.0-1012.214.4.0-1013.224.4.0-1016.254.4.0-1017.26+65 more4.4.0-1118.1326.5.0-1008.8Exploitability
AV:AAC:LPR:NUI:NScope
S:UImpact
C:LI:LA:NCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N