Updated: 2026-02-27 03:29:14.894123
Description:
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | MEDIUM | 4.8 |
| CVSS Version 3.x | MEDIUM | 5.4 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.4 | MEDIUM | Ignored | 2025-09-10 14:48:32 | This vulnerability applies only to legacy BR/EDR PIN pairing and requires a physically adjacent atta... | |
| CentOS 6 ELS | kernel | 2.6.32 | 5.4 | MEDIUM | Ignored | 2022-12-05 07:35:26 | Ignored due to low severity | |
| CentOS 7 ELS | kernel | 3.10.0 | 5.4 | MEDIUM | Released | CLSA-2024:1720468480 | 2024-07-23 17:20:19 | |
| CentOS 8.4 ELS | kernel | 4.18.0 | 5.4 | MEDIUM | Ignored | 2024-07-09 05:37:46 | Ignored due to low severity | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 5.4 | MEDIUM | Ignored | 2024-07-09 05:37:46 | Ignored due to low severity | |
| CentOS Stream 8 ELS | kernel | 4.18.0 | 5.4 | MEDIUM | Already Fixed | 2024-06-29 11:24:13 | ||
| CloudLinux 6 ELS | kernel | 2.6.32 | 5.4 | MEDIUM | Ignored | 2022-12-05 07:35:26 | Ignored due to low severity | |
| Oracle Linux 6 ELS | kernel | 2.6.32 | 5.4 | MEDIUM | Ignored | 2022-12-05 10:03:02 | Ignored due to low severity | |
| RHEL 7 ELS | kernel | 3.10.0 | 5.4 | MEDIUM | Released | CLSA-2025:1750353839 | 2025-06-20 00:28:27 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 5.4 | MEDIUM | Released | 2023-04-27 14:04:56 |