To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7150 | Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 08 Oct 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 08 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Windows Bluetooth Security Feature Bypass Vulnerability | Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key |
| References |
|
Subscriptions
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-10-08T16:17:19.706Z
Reserved: 2020-12-02T00:00:00.000Z
Link: CVE-2021-1683
No data.
Status : Modified
Published: 2021-01-12T20:15:32.807
Modified: 2024-11-21T05:44:53.297
Link: CVE-2021-1683
No data.
OpenCVE Enrichment
No data.
EUVD