Vulnerabilities > CVE-2020-6616
Attack vector
ADJACENT_NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
HIGH Availability impact
NONE Summary
Some Broadcom chips mishandle Bluetooth random-number generation because a low-entropy Pseudo Random Number Generator (PRNG) is used in situations where a Hardware Random Number Generator (HRNG) should have been used to prevent spoofing. This affects, for example, Samsung Galaxy S8, S8+, and Note8 devices with the BCM4361 chipset. The Samsung ID is SVE-2020-16882 (May 2020).
Vulnerable Configurations
References
- https://github.com/seemoo-lab/internalblue/blob/master/doc/rng.md
- https://twitter.com/naehrdine/status/1255980443368919045
- https://twitter.com/naehrdine/status/1255981245147877377
- https://security.samsungmobile.com/securityUpdate.smsb
- http://bluetooth.lol
- https://media.ccc.de/v/DiVOC-6-finding_eastereggs_in_broadcom_s_bluetooth_random_number_generator
- https://support.apple.com/kb/HT211100
- https://support.apple.com/kb/HT211168
- http://seclists.org/fulldisclosure/2020/May/49
- https://support.apple.com/HT211168