Vulnerability Description
Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
CVSS Score
6.5
MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.4, < 5.4.72 |
| Bluez | Bluez | All versions |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-RemotThird Party AdvisoryVDB Entry
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.Third Party Advisory
- http://packetstormsecurity.com/files/161229/Kernel-Live-Patch-Security-Notice-LSExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-RemotThird Party AdvisoryVDB Entry
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.Third Party Advisory
FAQ
What is CVE-2020-12352?
CVE-2020-12352 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
How severe is CVE-2020-12352?
CVE-2020-12352 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-12352?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Bluez Bluez.