Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-9506 |
CWE-ID | CWE-310 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
kernel-rt (Red Hat package) Operating systems & Components / Operating system package or component MRG Realtime Server applications / Application servers Other |
Vendor |
Red Hat Inc. |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU20290
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-9506
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due to a weakness in Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) protocol core specification that allows an attacker with close proximity to the affected system to perform a man-in-the-middle attack on an encrypted Bluetooth connection.
Successful exploitation of the vulnerability may allow an attacker to gain access to sensitive information or perform unauthorized actions.
MitigationInstall updates from vendor's website.
kernel-rt (Red Hat package): 3.10.0-229.rt56.144.el6rt - 3.10.0-693.58.1.rt56.652.el6rt
MRG Realtime: 2
:
CPE2.3https://access.redhat.com/errata/RHSA-2019:3165
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.