==================================================================== CERT-Renater Note d'Information No. 2020/VULN511 _____________________________________________________________________ DATE : 11/09/2020 HARDWARE PLATFORM(S): Devices supporting Bluetooth BR/EDR and LE using CTKD. OPERATING SYSTEM(S): Software supporting Bluetooth BR/EDR and LE using CTKD. ===================================================================== https://kb.cert.org/vuls/id/589825 _____________________________________________________________________ Devices supporting Bluetooth BR/EDR and LE using CTKD are vulnerable to key overwrite Vulnerability Note VU#589825 Original Release Date: 2020-09-09 | Last Revised: 2020-09-09 Overview Devices supporting both Bluetooth BR/EDR and LE using Cross-Transport Key Derivation (CTKD) for pairing are vulnerable to key overwrite, which enables an attacker to to gain additional access to profiles or services that are not restricted by reducing the encryption key strength or overwriting an authenticated key with an unauthenticated key. This vulnerability is being referred to as BLURtooth. Description As detailed in both the Bluetooth Core Specification versions 4.2 and 5.0, Bluetooth CTKD can be used for pairing by devices that support both Low Energy (BLE) and Basic Rate/Enhanced Data Rate (BR/EDR) transport methods, which are known as "dual-mode" devices. CTKD pairing allows the devices to pair once using either transport method while generating both the BR/EDR and LE Long Term Keys (LTK) without needing to pair a second time. Dual-mode devices using CTKD to generate a LTK or Link Key (LK) are able to overwrite the original LTK or LK in cases where that transport was enforcing a higher level of security. Impact Several potential attacks could be performed by exploiting CVE-2020-15802, including a Man in the Middle (MITM) attack. The vulnerability is being referred to as BLURtooth and the group of attacks is being referred to as the BLUR attacks. Vulnerable devices must permit a pairing or bonding to proceed transparently with no authentication, or a weak key strength, on at least one of the BR/EDR or LE transports in order to be susceptible to attack. For example, it may be possible to pair with certain devices using JustWorks pairing over BR/EDR or LE and overwriting an existing LTK or LK on the other transport. When this results in the reduction of encryption key strength or the overwrite of an authenticated key with an unauthenticated key, an attacker could gain additional access to profiles or services that are not otherwise restricted. Solution The Bluetooth SIG has released recommendations for mitigating this issue that include additional conformance tests to ensure that the overwrite of an authenticated key or a key of a given length with an unauthenticated key or a key of reduced length is not permitted in devices supporting Bluetooth Core Specification version 5.1 or greater. They also recommend that potentially vulnerable implementations introduce the restrictions on CTKD mandated in Bluetooth Core Specification versions 5.1 and later. Implementations should disallow overwrite of the LTK or LK for one transport with the LTK or LK derived from the other when this overwrite would result in either a reduction of the key strength of the original bonding or a reduction in the MITM protection of the original bonding (from authenticated to unauthenticated). This may require that the host track the negotiated length and authentication status of the keys in the Bluetooth security database. The Bluetooth SIG further recommends that devices restrict when they are pairable on either transport to times when user interaction places the device into a pairable mode or when the device has no bonds or existing connections to a paired device. In all cases, it is recommended that devices restrict the duration of pairing mode and overwrite an existing bonding only when devices are explicitly in pairing mode.k Acknowledgements Thanks to the reporter who wishes to remain anonymous. This document was written by Madison Oliver. Vendor Information l Bluetooth SIG Affected Notified: 2020-06-09 Updated: 2020-09-09 CVE-2020-15802 Affected Vendor Statement We have not received a statement from the vendor. Belden Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: August 31, 2020 CVE-2020-15802 Not Affected Vendor Statement Belden devices do not support Bluetooth and are not affected by this vulnerability. F5 Networks Inc. Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: September 01, 2020 CVE-2020-15802 Not Affected Vendor Statement F5 products do not include/support Bluetooth. Infoblox Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: August 28, 2020 CVE-2020-15802 Not Affected Vendor Statement We have not received a statement from the vendor. Intel Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: August 31, 2020 CVE-2020-15802 Not Affected Vendor Statement We have not received a statement from the vendor. Juniper Networks Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: September 08, 2020 CVE-2020-15802 Not Affected Vendor Statement Hello, The Juniper SIRT has assigned security incident report SIR-2020-362 for this issue. Based on our investigation we confirm that there are no platforms/products which are affected from these vulnerabilities. Let us know please if you have any questions. Regards. Cem Uluyazi Security Incident Response Team Juniper Networks Microchip Technology Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: September 07, 2020 CVE-2020-15802 Not Affected Vendor Statement Microchip Bluetooth Dual Mode solutions do NOT implement Cross-Transport Key Derivation (CTKD), Microchip solutions are NOT affected by BLURtooth vulnerability Miredo Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: August 28, 2020 CVE-2020-15802 Not Affected Vendor Statement We have not received a statement from the vendor. VMware Carbon Black Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: September 09, 2020 CVE-2020-15802 Not Affected Vendor Statement We have not received a statement from the vendor. Zyxel Not Affected Notified: 2020-08-28 Updated: 2020-09-09 Statement Date: September 09, 2020 CVE-2020-15802 Not Affected Vendor Statement Zyxel products are NOT affected either because they don’t support Cross Transport Key Derivation or do not support Bluetooth at all. View all 116 vendors References https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/ https://www.bluetooth.com/specifications/bluetooth-core-specification/ https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/reporting-security/ Other Information CVE IDs: CVE-2020-15802 Date Public: 2020-09-09 Date First Published: 2020-09-09 Date Last Updated: 2020-09-09 17:02 UTC Document Revision: 2 ========================================================= + CERT-RENATER       |    tel : 01-53-94-20-44          + + 23/25 Rue Daviel   |    fax : 01-53-94-20-41          + + 75013 Paris        |    email:cert@support.renater.fr + =========================================================