Vulnerability Description
The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Tizen | 1.0 |
| Samsung | Galaxy Gear | - |
Related Weaknesses (CWE)
References
- https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%Third Party Advisory
- https://review.tizen.org/git/?p=platform/upstream/bluez.git%3Ba=commit%3Bh=ff987
- https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.beThird Party Advisory
- https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%Third Party Advisory
- https://review.tizen.org/git/?p=platform/upstream/bluez.git%3Ba=commit%3Bh=ff987
- https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.beThird Party Advisory
FAQ
What is CVE-2018-16264?
CVE-2018-16264 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tiz...
How severe is CVE-2018-16264?
CVE-2018-16264 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16264?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Tizen, Samsung Galaxy Gear.