CVE-2023-24023 — Channel Accessible by Non-Endpoint in Packages Modules Bluetooth
CWE-300 — Channel Accessible by Non-EndpointCWE-326 — Inadequate Encryption Strength19 documents11 sources
Severity
6.8MEDIUMNVD
EPSS
0.2%
top 57.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 28
Latest updateSep 1
Description
Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.
CVSS vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 1.6 | Impact: 5.2
Affected Packages10 packages
🔴Vulnerability Details
7OSV▶
CVE-2023-24023: In multiple locations, there is a possible way to impersonate and MitM a device across session by only compromising one session key due to an insecure↗2025-09-01
OSV▶
linux, linux-aws, linux-aws-5.15, linux-azure-5.15, linux-azure-fde, linux-azure-fde-5.15, linux-gcp, linux-gcp-5.15, linux-gke, linux-gkeop, linux-gkeop-5.15, linux-hwe-5.15, linux-ibm, linux-ibm-5.1↗2024-04-19
OSV▶
linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-oracle, linu↗2024-04-19
OSV▶
CVE-2023-24023: Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4↗2023-11-28
📋Vendor Advisories
9Android▶
CVE-2023-24023: Android Security Bulletin 2025-09-01
CVE: CVE-2023-24023
Severity: HIGH
Type: EoP
Affected AOSP versions: 13, 14, 15
References: A-255601934↗2025-09-01
💬Community
1Bugzilla
▶