Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1683


Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key


Published

2021-01-12T20:15:32.807

Last Modified

2024-11-21T05:44:53.297

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.0 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System microsoft windows_10 - Yes
Operating System microsoft windows_10 20h2 Yes
Operating System microsoft windows_10 1607 Yes
Operating System microsoft windows_10 1803 Yes
Operating System microsoft windows_10 1809 Yes
Operating System microsoft windows_10 1909 Yes
Operating System microsoft windows_10 2004 Yes
Operating System microsoft windows_8.1 - Yes
Operating System microsoft windows_rt_8.1 - Yes
Operating System microsoft windows_server_2012 r2 Yes
Operating System microsoft windows_server_2016 - Yes
Operating System microsoft windows_server_2016 20h2 Yes
Operating System microsoft windows_server_2016 1909 Yes
Operating System microsoft windows_server_2016 2004 Yes
Operating System microsoft windows_server_2019 - Yes

References