Show plain JSON{"id": "CVE-2019-19194", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 6.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2020-02-12T15:15:12.053", "references": [{"url": "http://www.telink-semi.com/ble", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://asset-group.github.io/disclosures/sweyntooth/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.telink-semi.com/ble", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://asset-group.github.io/disclosures/sweyntooth/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices installs a zero long term key (LTK) if an out-of-order link-layer encryption request is received during Secure Connections pairing. An attacker in radio range can have arbitrary read/write access to protected GATT service data, cause a device crash, or possibly control a device's function by establishing an encrypted session with the zero LTK."}, {"lang": "es", "value": "La implementaci\u00f3n del Secure Manager Protocol (SMP) de Bluetooth Low Energy en Telink Semiconductor BLE SDK versiones anteriores a noviembre de 2019 para los dispositivos TLSR8x5x versiones hasta 3.4.0, TLSR823x versiones hasta 1.3.0 y TLSR826x versiones hasta 3.3, instala una clave a largo plazo (LTK) cero si una petici\u00f3n de cifrado de capa de enlace fuera de servicio es recibida durante el emparejamiento de Secure Connections. Un atacante dentro del radio de alcance puede tener acceso de lectura/escritura arbitrario a los datos protegidos del servicio GATT, provocar un bloqueo del dispositivo o posiblemente controlar la funci\u00f3n de un dispositivo estableciendo una sesi\u00f3n cifrada con el LTK cero."}], "lastModified": "2024-11-21T04:34:18.027", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:telink-semi:tlsr8258_ble_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4C1D7B5-99AD-406C-9849-180044D07053", "versionEndIncluding": "3.4.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:telink-semi:tlsr8258:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "803BCF1A-2DE5-41E0-9C9A-BD557DF2E432"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:telink-semi:tlsr8269_ble_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEE18168-F273-43D1-A215-BBE3522BDDA0", "versionEndIncluding": "3.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:telink-semi:tlsr8269:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E19FBD81-0731-45DC-800E-B9DDC91FAEDC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:telink-semi:tlsr8253_ble_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1891E0AC-EB59-48B7-8151-371BE0D9CB73", "versionEndIncluding": "3.4.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:telink-semi:tlsr8253:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "34D5D890-AD2C-4199-A433-7DF20B2F150D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:telink-semi:tlsr8251_ble_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "414AEE52-3787-4340-A4D6-BA9AD2C2AB87", "versionEndIncluding": "3.4.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:telink-semi:tlsr8251:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA98E09B-A6BC-41FD-BD8D-091E29941F16"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:telink-semi:tlsr8232_ble_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F4D5A15-6B0E-45D3-8802-0FB3120406ED", "versionEndIncluding": "1.3.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:telink-semi:tlsr8232:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "28482975-1D68-4325-825B-7B597CE1E109"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}